Sciweavers

5829 search results - page 139 / 1166
» The Practice of Cluster Analysis
Sort
View
LCN
2006
IEEE
15 years 10 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler
APLAS
2006
ACM
15 years 10 months ago
A Practical String Analyzer by the Widening Approach
The static determination of approximated values of string expressions has many potential applications. For instance, approximated string values may be used to check the validity an...
Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, Kyung-Goo...
136
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
140
Voted
GROUP
2005
ACM
15 years 9 months ago
Uncovering privacy attitudes and practices in instant messaging
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7point Likert scale, the reported concern about ...
Sameer Patil, Alfred Kobsa
SC
2005
ACM
15 years 9 months ago
Making Sequential Consistency Practical in Titanium
The memory consistency model in parallel programming controls the order in which operations performed by one thread may be observed by another. Language designers have been reluct...
Amir Kamil, Jimmy Su, Katherine A. Yelick