Sciweavers

501 search results - page 96 / 101
» Redundancy and Diversity in Security
Sort
View
TON
2008
108views more  TON 2008»
13 years 7 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 2 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
CIKM
2009
Springer
14 years 2 months ago
StereoTrust: a group based personalized trust model
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
CISS
2007
IEEE
14 years 2 months ago
Coherent Optical CDMA with low MAI
Abstract. Spectrally phase-coded optical code division multiple access (OCDMA), demodulated with phase and polarization diversity devices, exhibits high spectral efficiency and low...
A. Brinton Cooper, Jacob B. Khurgin, Shuangmei Xu,...
INFOCOM
2007
IEEE
14 years 2 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin