publié le: September 2009
We address the issue of measuring distribution fairness in Internet-scale networks. This problem has several interesting instances encountered in dif...
publié le: July 2008
Cryptanalytic time-memory trade-offs have been studied for 25 years and have benefited from several improvements since the original work of Hellman....
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the p...
The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on t...
An intrusion detection system plays an important role in a firm’s overall security protection. Its main purpose is to identify potentially intrusive...