Sciweavers

1990 search results - page 222 / 398
» services 2010
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
A mobile peer-to-peer system for opportunistic content-centric networking
In this work we present a middleware architecture for a mobile peer-to-peer content distribution system. Our architecture allows wireless content dissemination between mobile node...
Ólafur Ragnar Helgason, Emre A. Yavuz, Sylv...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 4 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2010
Springer
89views Education» more  CORR 2010»
15 years 4 months ago
SHIELD: Social sensing and Help In Emergency using mobiLe Devices
School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g....
Gautam S. Thakur, Mukul Sharma, Ahmed Helmy
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 4 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...