Sciweavers

6122 search results - page 1156 / 1225
» Securing network access in wireless sensor networks
Sort
View
GLOBECOM
2009
IEEE
14 years 4 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
EUROPAR
2009
Springer
14 years 2 months ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
ISI
2005
Springer
14 years 3 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...
CHI
2010
ACM
14 years 4 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
ICON
2007
IEEE
14 years 4 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
« Prev « First page 1156 / 1225 Last » Next »