×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [acm workshop]
Home >
acm workshop
Who Watches the Watchers? Metrics for Security Strategy
45 views
The Hitchhiker’s Guide to Successful Residential Sensing Deployments Timothy W. Hnat, Vijay Srinivasan, Jiakang Lu, Tamim I. Sookoor, Raymond Dawson, John.
213 views
WORM PROPAGATION Terry Griffin Sandeep Pinnamaneni Vandana Gunupudi.
261 views
2015-6-1 1 Secure Vehicular Communications Speaker: Xiaodong Lin University of Waterloo xdlin
214 views
Secure Routing with AODV Protocol for Mobile Ad Hoc Networks Anitha Prahladachar Tahira Farid Course: 60-564 Instructor: Dr. Aggarwal.
214 views
Inferring the meaning of chord sequences via lyrics Tom O'Hara CS Adjunct at Texas State 2010-11 (
[email protected]
)
[email protected]
Texas.
221 views
Will Darby 91.514 5 April 2010. What is Federated Security Example Implementations Security Assertion Markup Language (SAML) Overview Alternative.
219 views
1 Computer Networks Network Layer (Part 1). 2 Last classes Data-link layer –Functions –Specific implementations, devices.
221 views
1 Network Analysis Visualization (NAV) Meghan Allen and Peter McLachlan December 15, 2004.
217 views
1 On Multiple Point Coverage in Wireless Sensor Networks Shuhui Yangy, Fei Daiz, Mihaela Cardeiy, and Jie Wuy Department of Computer Science and Engineering.
213 views
Sam Becker. Introduction Why is it important? Security Why is it needed? Solution Schemes Questions.
215 views
WG2 Task Force “Crowdsourcing” 8th Qualinet General Meeting, Delft, 2014 Tobias Hossfeld WG2 Mechanisms and Models crowd:berlinmeeting2014.
214 views
< Previous
Next >