Sciweavers

1653 search results - page 282 / 331
» Timed analysis of security protocols
Sort
View
EMS
2008
IEEE
13 years 10 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ISI
2008
Springer
13 years 8 months ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
SPEECH
2011
13 years 3 months ago
A multistage approach to blind separation of convolutive speech mixtures
We propose a novel algorithm for the separation of convolutive speech mixtures using two-microphone recordings, based on the combination of independent component analysis (ICA) an...
Tariqullah Jan, Wenwu Wang, DeLiang Wang
MOBICOM
2005
ACM
14 years 2 months ago
Abiding geocast: time--stable geocast for ad hoc networks
Abiding geocast is a time stable geocast delivered to all nodes that are inside a destination region within a certain period of time. Services like position–based advertising, p...
Christian Maihöfer, Tim Leinmüller, Elma...
TMC
2012
11 years 11 months ago
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, s...
Xinyu Zhang, Kang G. Shin