Sciweavers

6682 search results - page 1332 / 1337
» network 2006
Sort
View
COMCOM
2006
88views more  COMCOM 2006»
13 years 9 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
COMPLEXITY
2006
91views more  COMPLEXITY 2006»
13 years 9 months ago
The evolution of technology within a simple computer model
Technology--the collection of devices and methods available to human society--evolves by constructing new devices and methods from ones that previously exist, and in turn offering...
W. Brian Arthur, Wolfgang Polak
CORR
2006
Springer
169views Education» more  CORR 2006»
13 years 9 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
CORR
2006
Springer
82views Education» more  CORR 2006»
13 years 9 months ago
Rate Regions for Relay Broadcast Channels
A partially cooperative relay broadcast channel (RBC) is a three-node network with one source node and two destination nodes (destinations 1 and 2) where destination 1 can act as a...
Yingbin Liang, Gerhard Kramer
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 9 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
« Prev « First page 1332 / 1337 Last » Next »