Sciweavers

361 search results - page 56 / 73
» Toward a Query Language for Network Attack Data
Sort
View
SENSYS
2003
ACM
14 years 1 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
ICNP
2005
IEEE
14 years 1 months ago
Typed Abstraction of Complex Network Compositions
straction of Complex Network Compositions∗ Azer Bestavros, Adam D. Bradley, Assaf J. Kfoury, and Ibrahim Matta Department of Computer Science Boston University The heterogeneity...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
LREC
2010
197views Education» more  LREC 2010»
13 years 9 months ago
Question Answering Biographic Information and Social Network Powered by the Semantic Web
After several years of development, the vision of the Semantic Web is gradually becoming reality. Large data repositories have been created and offer semantic information in a mac...
Peter Adolphs, Xiwen Cheng, Tina Klüwer, Hans...
ICDCS
2010
IEEE
13 years 5 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
IFIP
2003
Springer
14 years 1 months ago
A Rotational Sector-Based, Receiver-Oriented Mechanism for Location Tracking and Medium Access Control in Ad Hoc Networks Using
The use of directional antenna in wireless ad hoc networks potentially increases simultaneous communication by directing the transmitting and receiving beams towards the receiver a...
Tetsuro Ueda, Shinsuke Tanaka, Dola Saha, Siuli Ro...