Sciweavers

1081 search results - page 148 / 217
» Working with the LR Degrees
Sort
View
JNW
2006
142views more  JNW 2006»
13 years 11 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
JPDC
2006
187views more  JPDC 2006»
13 years 11 months ago
On constructing k-connected k-dominating set in wireless ad hoc and sensor networks
An important problem in wireless ad hoc and sensor networks is to select a few nodes to form a virtual backbone that supports routing and other tasks such as area monitoring. Prev...
Fei Dai, Jie Wu
ENTCS
2007
89views more  ENTCS 2007»
13 years 11 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang
ENTCS
2007
137views more  ENTCS 2007»
13 years 11 months ago
Formal Sequentialization of Distributed Systems via Program Rewriting
Formal sequentialization is introduced as a rewriting process for the reduction of parallelism and internal communication statements of distributed imperative programs. It constru...
Miquel Bertran, Francesc-Xavier Babot, August Clim...
PR
2008
120views more  PR 2008»
13 years 11 months ago
Fuzzy integral based information fusion for classification of highly confusable non-speech sounds
Acoustic event classification may help to describe acoustic scenes and contribute to improve the robustness of speech technologies. In this work, fusion of different information s...
Andrey Temko, Dusan Macho, Climent Nadeu