Sciweavers

2927 search results - page 119 / 586
» Secure Distributed Human Computation
Sort
View
ISI
2006
Springer
13 years 9 months ago
Strategic Intelligence Analysis: From Information Processing to Meaning-Making
Strategic intelligence involves the efforts to understand the "Big Picture" emerging from data sources. Concerning textual data, this process involves the extraction of m...
Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldbe...
IANDC
2008
84views more  IANDC 2008»
13 years 7 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
MIDDLEWARE
2007
Springer
14 years 3 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
ICPPW
2005
IEEE
14 years 2 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
MOBIWAC
2009
ACM
14 years 3 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella