Sciweavers

218 search results - page 23 / 44
» A Network Management Architecture Using XML-Based Policy Inf...
Sort
View
IDEAL
2005
Springer
14 years 1 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
14 years 1 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia
DISCEX
2003
IEEE
14 years 1 months ago
Integrated Security Services for Dynamic Coalitions
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access permissions to coalition members based on negotiated r...
Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bo...
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
WPES
2004
ACM
14 years 1 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...