Sciweavers

1129 search results - page 192 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
WWW
2007
ACM
14 years 8 months ago
Optimized query planning of continuous aggregation queries in dynamic data dissemination networks
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Krithi Ramamritham
DSN
2011
IEEE
12 years 7 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
ICAS
2005
IEEE
171views Robotics» more  ICAS 2005»
14 years 1 months ago
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
Access to Grid services is currently limited to devices having substantial computing, network and memory resources such as PCs. On the other hand, most of mobile devices do not ha...
Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han...
SWWS
2008
13 years 9 months ago
Multi-Modal Health and Activity Monitoring Framework for Elderly People at Home
- Since the population of elderly people grows absolutely and in relation to the overall population in the world, the improvement of the quality of life of elderly people at home i...
Ross Velentzas, Andy Marsh, Christos Biniaris, Jer...