Sciweavers

2473 search results - page 209 / 495
» The Logic of Communication Graphs
Sort
View
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 10 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003
ICC
2007
IEEE
15 years 10 months ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj
WMCSA
1999
IEEE
15 years 8 months ago
DataX: an Approach to Ubiquitous Database Access
This paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy-based architecture that supports disconnected operation by r...
Hui Lei, Marion Blount, Carl D. Tait
AB
2008
Springer
15 years 10 months ago
Property Preservation along Embedding of Biological Regulatory Networks
In the course of understanding biological regulatory networks (BRN), scientists usually start by studying small BRNs that they believe to be of particular importance to represent a...
Mbarka Mabrouki, Marc Aiguier, Jean-Paul Comet, Pa...
150
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha