Sciweavers

472 search results - page 41 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
IMC
2007
ACM
13 years 9 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
VIZSEC
2005
Springer
14 years 1 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
ICANN
2010
Springer
13 years 5 months ago
Dynamics and Function of a CA1 Model of the Hippocampus during Theta and Ripples
The hippocampus is known to be involved in spatial learning in rats. Spatial learning involves the encoding and replay of temporally sequenced spatial information. Temporally seque...
Vassilis Cutsuridis, Michael E. Hasselmo
INFOCOM
2006
IEEE
14 years 1 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras