Sciweavers

1990 search results - page 308 / 398
» Towards software-friendly networks
Sort
View
ACISP
2007
Springer
14 years 2 months ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
WCNC
2010
IEEE
14 years 1 months ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
14 years 1 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
ERCIMDL
2006
Springer
161views Education» more  ERCIMDL 2006»
14 years 1 months ago
Scalable Semantic Overlay Generation for P2P-Based Digital Libraries
The advent of digital libraries along with the tremendous growth of digital content call for distributed and scalable approaches for managing vast data collections. Peer-to-peer (P...
Christos Doulkeridis, Kjetil Nørvåg, ...
AINA
2010
IEEE
14 years 1 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores