Sciweavers

146 search results - page 20 / 30
» Supporting multiple protection strategies in optical network...
Sort
View
INFORMATICASI
2010
13 years 4 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
WOWMOM
2009
ACM
164views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Selecting vertical handover candidates in IEEE 802.11 mesh networks
The IEEE 802.11 working group currently integrates the option of mesh networking into its standard for WLANs. In addition to WLAN meshes, future wireless networks will be expanded...
Sven Wiethölter, Adam Wolisz
MOBICOM
2004
ACM
14 years 1 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
WSC
1997
13 years 9 months ago
Forecasting Investment Opportunities Through Dynamic Simulation
Outcomes of this modeling research are the ability to facilitate comparisons of investment alternatives or strategies; regarding primary targets, possible annual revenues, promoti...
Stephen R. Parker
ACSAC
1999
IEEE
13 years 12 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti