Computer Networks Laboratory

Results: 291



#Item
161Telecommunications engineering / Sensor node / International Conference on Information Processing in Sensor Networks / TinyOS / Conference on Embedded Networked Sensor Systems / Crossbow Technology / ANT / Wireless sensor network / Technology / Computing

Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge (Demo Abstract) An Liu, Young-Hyun Oh, Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:16
162Matrix theory / Operations research / Eigenvalues and eigenvectors / Singular value decomposition / Least squares / Mathematical optimization / Linear prediction / Matrix / Sturm–Liouville theory / Algebra / Mathematics / Linear algebra

1 Accelerated Distributed Average Consensus Via Localized Node State Prediction Tuncer C. Aysal, Boris N. Oreshkin and Mark J. Coates Telecommunications and Signal Processing–Computer Networks Laboratory

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Language: English - Date: 2009-04-06 23:23:14
163Software testing / Hacking / Vulnerability / Zero-day attack / Patch / Social vulnerability / Common Vulnerabilities and Exposures / Exploit / Responsible disclosure / Computer security / Cyberwarfare / Computer network security

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
164Scheduling / Local area networks / Computer memory / Application programming interfaces / Remote direct memory access / Message Passing Interface / InfiniBand / Barrier / Blocking / Computing / Concurrent computing / Parallel computing

Overlapping Computation and Communication: Barrier Algorithms and ConnectX-2 CORE-Direct Capabilities Richard L. Graham, Steve Poole Oak Ridge National Laboratory (ORNL) Oak Ridge, TN, USA Email: {rlgraham,spoole}@ornl.g

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2010-05-20 06:50:02
165Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
166Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
167Electronics / Nervous system / Science / Fabless semiconductor companies / Computational statistics / Field-programmable gate array / Spiking neural network / Cellular neural network / Xilinx / Neural networks / Electronic engineering / Computational neuroscience

Bluehive — A Field-Programable Custom Computing Machine for Extreme-Scale Real-Time Neural Network Simulation Simon W Moore, Paul J Fox, Steven JT Marsh, A Theodore Markettos and Alan Mujumdar Computer Laboratory Unive

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-07-31 08:34:10
168Information / Electronic engineering / Network performance / Cooperative diversity / Channel / Network packet / Bit error rate / MIMO / Antenna diversity / Radio resource management / Telecommunications engineering / Information theory

Packet Error Probability for Decode-and-Forward Cooperative Networks of Selfish Users Ioannis Chatzigeorgiou1 , Weisi Guo1 , Ian J. Wassell1 and Rolando Carrasco2 1 Computer Laboratory, University of Cambridge, United K

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-04-28 12:25:27
169SMS / Text messaging / Short message service center / Mobile phone spam / Multimedia Messaging Service / EMI / ESME / General Packet Radio Service / Voice-mail / Technology / Mobile technology / Wireless

Exploiting Open Functionality in SMS-Capable Cellular Networks William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Systems and Internet Infrastructure Security Laboratory Department of Computer Science a

Add to Reading List

Source URL: www.enck.org

Language: English
170Concurrent computing / Distributed computing / Peer-to-peer / Database / Scalability / ANts P2P / Gossip protocol / Computing / File sharing networks / Database management systems

Partial Read from Peer-to-Peer Databases Farnoush Banaei-Kashani University of Southern California Department of Computer Science Information Laboratory (InfoLab) Los Angeles, CA

Add to Reading List

Source URL: infolab.usc.edu

Language: English - Date: 2009-11-05 01:09:05
UPDATE