Sciweavers

2673 search results - page 409 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
VTC
2007
IEEE
14 years 3 months ago
Spatial Outage Probability Formula for CDMA Networks
— In this paper, we propose a new framework for the study of cellular networks called the fluid model and we derive from this model analytical formulas for interference, outage ...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
IJAHUC
2006
128views more  IJAHUC 2006»
13 years 9 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
ACSAC
2006
IEEE
14 years 1 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
ISPEC
2007
Springer
14 years 3 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ASAP
2003
IEEE
133views Hardware» more  ASAP 2003»
14 years 2 months ago
Storage Management in Process Networks using the Lexicographically Maximal Preimage
At the Leiden Embedded Research Center, we are developing a compiler called Compaan that automatically translates signal processing applications written in Matlab into Kahn Proces...
Alexandru Turjan, Bart Kienhuis