Sciweavers

807 search results - page 150 / 162
» Term Rewriting for Access Control
Sort
View
BROADNETS
2006
IEEE
14 years 1 months ago
CAM-MAC: A Cooperative Asynchronous Multi-Channel MAC Protocol for Ad Hoc Networks
— Medium access control (MAC) protocols have been studied under different contexts for several years now. In all these MAC protocols, nodes make independent decisions on when to ...
Tie Luo, Mehul Motani, Vikram Srinivasan
INFOCOM
2006
IEEE
14 years 1 months ago
Data Synchronization Methods Based on ShuffleNet and Hypercube for Networked Information Systems
– In contrast to a typical single source of data updates in Internet applications, data files in a networked information system are often distributed, replicated, accessed and up...
David J. Houck, Kin K. Leung, Peter Winkler
INFOCOM
2006
IEEE
14 years 1 months ago
ISP and Egress Path Selection for Multihomed Networks
— Multihoming has been used by stub networks for several years as a form of redundancy, improving the availability of Internet access. More recently, Intelligent Route Control (I...
Amogh Dhamdhere, Constantinos Dovrolis
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton