Sciweavers

1737 search results - page 48 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
MOBICOM
2006
ACM
14 years 3 months ago
Deployment analysis in underwater acoustic wireless sensor networks
In this paper, different deployment strategies for two-dimensional and three-dimensional communication architectures for UnderWater Acoustic Sensor Networks (UW-ASNs) are proposed...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
NDSS
2003
IEEE
14 years 2 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
MOBIHOC
2003
ACM
14 years 8 months ago
Energy-efficient caching strategies in ad hoc wireless networks
In this paper, we address the problem of energy-conscious cache placement in wireless ad hoc networks. We consider a network comprising a server with an interface to the wired net...
Pavan Nuggehalli, Vikram Srinivasan, Carla-Fabiana...
SPAA
2010
ACM
14 years 1 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
AINA
2006
IEEE
14 years 3 months ago
Accelerating the HMMER Sequence Analysis Suite Using Conventional Processors
Due to the ever-increasing size of sequence databases it has become clear that faster techniques must be employed to effectively perform biological sequence analysis in a reasonab...
John Paul Walters, Bashar Qudah, Vipin Chaudhary