Sciweavers

640 search results - page 123 / 128
» Topology Without Tears
Sort
View
CCR
2010
184views more  CCR 2010»
13 years 8 months ago
Characterising temporal distance and reachability in mobile and online social networks
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 8 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
CN
2007
117views more  CN 2007»
13 years 8 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
ISM
2006
IEEE
277views Multimedia» more  ISM 2006»
13 years 8 months ago
Efficient Bottom-Up Image Segmentation Using Region Competition and the Mumford-Shah Model for Color and Textured Images
Curve evolution implementations [3][23] [25] of the Mumford-Shah functional [16] are of broad interest in image segmentation. These implementations, however, have initialization p...
Yongsheng Pan, J. Douglas Birdwell, Seddik M. Djou...
JSAC
2006
156views more  JSAC 2006»
13 years 8 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson