Sciweavers

1254 search results - page 226 / 251
» Resource and Service Discovery in the iGrid Information Serv...
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
SAC
2010
ACM
14 years 2 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
EMS
2009
IEEE
14 years 2 months ago
Simulation of a Smart Grid City with Software Agents
—In the future smart city, new information and communication technologies will enable a better management of the available resources. The future smart grid infrastructure is emer...
Stamatis Karnouskos, Thiago Nass de Holanda
P2P
2009
IEEE
114views Communications» more  P2P 2009»
14 years 2 months ago
Why Kad Lookup Fails
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup pe...
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yo...
IROS
2009
IEEE
127views Robotics» more  IROS 2009»
14 years 2 months ago
Expressive facial speech synthesis on a robotic platform
— This paper presents our expressive facial speech synthesis system Eface, for a social or service robot. Eface aims at enabling a robot to deliver information clearly with empat...
Xingyan Li, Bruce MacDonald, Catherine I. Watson