Sciweavers

14518 search results - page 2737 / 2904
» Two Problems for Sophistication
Sort
View
TGC
2005
Springer
14 years 4 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
14 years 4 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...
DMKD
2004
ACM
139views Data Mining» more  DMKD 2004»
14 years 4 months ago
Iterative record linkage for cleaning and integration
Record linkage, the problem of determining when two records refer to the same entity, has applications for both data cleaning (deduplication) and for integrating data from multipl...
Indrajit Bhattacharya, Lise Getoor
IMC
2004
ACM
14 years 4 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
IMC
2004
ACM
14 years 4 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
« Prev « First page 2737 / 2904 Last » Next »