Sciweavers

1266 search results - page 73 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
TMC
2011
1105views more  TMC 2011»
14 years 11 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
NCA
2008
IEEE
15 years 10 months ago
Feedback-controlled WLAN: Achieving Channel-Availability in Mesh Networks
Wireless mesh networks are a promising backbonesolution for applications in industrial automation. However, high availability of the communication channel is not inherently guaran...
Svilen Ivanov, Edgar Nett, André Herms, Dan...
DEBS
2008
ACM
15 years 6 months ago
Distributed automatic service composition in large-scale systems
Automatic service composition is an active research area in the field of service computing. This paper presents a distributed approach to automatically discover a composition of s...
Songlin Hu, Vinod Muthusamy, Guoli Li, Hans-Arno J...
ICDCS
2009
IEEE
16 years 1 months ago
FLASH: Fine-Grained Localization in Wireless Sensor Networks Using Acoustic Sound Transmissions and High Precision Clock Synchro
Sensor localization in wireless sensor networks is an important component of many applications. Previous work has demonstrated how localization can be achieved using various metho...
Evangelos Mangas, Angelos Bilas
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 10 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque