Sciweavers

216 search results - page 20 / 44
» Security Measures and Weaknesses of the GPRS Security Archit...
Sort
View
CORR
2007
Springer
135views Education» more  CORR 2007»
13 years 8 months ago
Detailed Network Measurements Using Sparse Graph Counters: The Theory
— Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that m...
Yi Lu, Andrea Montanari, Balaji Prabhakar
OOPSLA
2009
Springer
14 years 1 months ago
Agile anthropology and Alexander's architecture: an essay in three voices
During its formative decades the software community looked twice to the theories of ChristopherAlexander for inspiration, both times failing to completely master the architect’s...
Jenny Quillien, Pam Rostal, Dave West
WISEC
2009
ACM
14 years 3 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt
AICT
2008
IEEE
14 years 3 months ago
Attaching an IMS Subscriber to an Unknown Foreign Network
The networking landscape is about to change. The multitude of different kind of operators and access networks can provide access at any time irrespective of location. However, it ...
Seppo Heikkinen
AGENTS
1997
Springer
14 years 23 days ago
Agent-Based Expert Assistance for Visual Problem Solving
This paper presents a domain-independent architecture for facilitating visual problem solving between robots or softbots and humans. The architecture de nes virtual and human agen...
Erika Rogers, Robin R. Murphy, Barb Ericson