Sciweavers

610 search results - page 103 / 122
» Predicate-Based Key Exchange
Sort
View
AUTOMATICA
2006
140views more  AUTOMATICA 2006»
13 years 7 months ago
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measure...
Vijay Gupta, Timothy H. Chung, Babak Hassibi, Rich...
COMCOM
2006
87views more  COMCOM 2006»
13 years 7 months ago
Practical utilities for monitoring multicast service availability
Monitoring has become one of the key issues for the successful deployment of IP multicast in the Internet. During the last decade, several tools and systems have been developed to ...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 7 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CORR
2006
Springer
109views Education» more  CORR 2006»
13 years 7 months ago
Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks
n source and destination pairs randomly located in an area want to communicate with each other. Signals transmitted from one user to another at distance r apart are subject to a po...
Ayfer Özgür, Olivier Lévêqu...
ENTCS
2006
140views more  ENTCS 2006»
13 years 7 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...