Sciweavers

3340 search results - page 149 / 668
» Teaching networking hardware
Sort
View
ISCAS
2005
IEEE
168views Hardware» more  ISCAS 2005»
15 years 9 months ago
Is home network application acceptable or not?
— Application of the home network is the most important factor to make the future home network environment pervasive. Although home network environment allows us to control appli...
Ikuo Keshi, Yumi Shiraishi, Hiroaki Niwamoto, Mino...
139
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Detecting Network Intrusions via Sampling: A Game Theoretic Approach
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
Murali S. Kodialam, T. V. Lakshman
MOBICOM
2003
ACM
15 years 9 months ago
Distributed algorithms for guiding navigation across a sensor network
We develop distributed algorithms for self-organizing sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed acros...
Qun Li, Michael DeRosa, Daniela Rus
NORDSEC
2009
Springer
15 years 8 months ago
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
In this paper we introduce ContikiSec, a secure network layer for wireless sensor networks, designed for the Contiki Operating System. ContikiSec has a configurable design, providi...
Lander Casado, Philippas Tsigas
CORR
2010
Springer
103views Education» more  CORR 2010»
15 years 4 months ago
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many pot...
Siva Rama Krishnan Somayaji, Ch. A. S. Murty