Sciweavers

249 search results - page 35 / 50
» A secure scan design methodology
Sort
View
DS
1997
104views Database» more  DS 1997»
13 years 9 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
TPDS
2010
134views more  TPDS 2010»
13 years 2 months ago
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs
Null data frames are a special but important type of frames in IEEE 802.11 WLANs. They are widely used in 802.11 WLANs for control purposes such as power management, channel scanni...
Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia, Can...
IMC
2004
ACM
14 years 1 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
LCN
2007
IEEE
14 years 1 months ago
Modified Algorithms for Multilevel GRSB Protocol
— GRSB - Guaranteed, Reliable, Secure Broadcast - is a protocol that provides reliable and secure broadcast / multicast communications [1,2]. It can be implemented in many types ...
Mohammad Asadul Hoque, S. M. Iftekharul Amin, Md. ...
AGENTS
1997
Springer
13 years 11 months ago
An Intelligent Assistant for Patient Health Care
The Patient Advocate is designed to be an intelligent assistant for patient-centered health care. Residing on a home computer or special-purpose device and operating within an ext...
Silvia Miksch, Kenneth Cheng, Barbara Hayes-Roth