Purdue University

Results: 5254



#Item
461

A mathematical model and inversion procedure for Magneto-Acousto-Electric Tomography (MAET) Leonid Kunyansky University of Arizona, Tucson, AZ

Add to Reading List

Source URL: www.math.purdue.edu

Language: English - Date: 2012-06-27 09:02:45
    462

    Practical Defenses Against Pollution Attacks in Wireless Network Coding JING DONG, Purdue University REZA CURTMOLA, New Jersey Institute of Technology CRISTINA NITA-ROTARU, Purdue University

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2012-10-31 17:20:45
      463

      ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks BARUCH AWERBUCH Johns Hopkins University REZA CURTMOLA

      Add to Reading List

      Source URL: homes.cerias.purdue.edu

      Language: English - Date: 2007-06-01 13:58:33
        464

        Applying Game Theory to Analyze Attacks and Defenses in Virtual Coordinate Systems Sheila Becker† , Jeff Seibert∗ , David Zage∗ , Cristina Nita-Rotaru∗ and Radu State† ∗ Purdue University West Lafayette, IN 4

        Add to Reading List

        Source URL: homes.cerias.purdue.edu

        Language: English - Date: 2012-11-05 10:24:59
          465

          A Direct D-bar Reconstruction Algorithm for Recovering a Complex Conductivity in 2-D Jennifer Mueller Department of Mathematics and School of Biomedical Engineering Colorado State University

          Add to Reading List

          Source URL: www.math.purdue.edu

          Language: English - Date: 2012-06-20 12:26:57
            466

            Towards Securing Data Delivery in Peer-to-Peer Streaming Jeff Seibert, Xin Sun, Cristina Nita-Rotaru, Sanjay Rao Purdue University , , ,

            Add to Reading List

            Source URL: homes.cerias.purdue.edu

            Language: English - Date: 2011-01-22 11:29:45
              467

              Dynamic and Efficient Key Management for Access Hierarchies MIKHAIL J. ATALLAH Purdue University MARINA BLANTON University of Notre Dame

              Add to Reading List

              Source URL: www.cse.nd.edu

              Language: English - Date: 2009-02-11 09:47:47
                468Computing / Software / Object-oriented programming languages / Data management / Computer systems / Concurrent programming languages / Functional languages / Tuple / Scala / Log analysis / Extensible Storage Engine / Logfile

                LogGC: Garbage Collecting Audit Log Kyu Hyung Lee Xiangyu Zhang Dongyan Xu Department of Computer Science and CERIAS, Purdue University West Lafayette, IN 47907, USA

                Add to Reading List

                Source URL: friends.cs.purdue.edu

                Language: English - Date: 2013-08-20 23:04:36
                469

                Black Church Culture and Community Action Sandra L. Barnes, Purdue University Abstract Cultural theory posits that social groups possess a cultural repertoire or “tool kit” that reflects beliefs, ritual practices, st

                Add to Reading List

                Source URL: www.case.edu

                Language: English - Date: 2008-03-10 16:17:35
                  470

                  Split Null Keys: A Null Space Based Defense for Pollution Attacks in Wireless Network Coding Andrew Newell Cristina Nita-Rotaru Department of Computer Science, Purdue University 305 N. University St., West Lafayette, IN

                  Add to Reading List

                  Source URL: homes.cerias.purdue.edu

                  Language: English - Date: 2012-11-05 10:28:35
                    UPDATE