Sciweavers

7274 search results - page 1300 / 1455
» Abstractions for network update
Sort
View
OTM
2007
Springer
15 years 10 months ago
A Bluetooth-Based JXME Infrastructure
Abstract. Over the last years, research efforts have led the way to embed computation into the environment. Much attention is drawn to technologies supporting dynamicity and mobil...
Carlo Blundo, Emiliano De Cristofaro
OTM
2007
Springer
15 years 10 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional beneï...
Sören Preibusch
PET
2007
Springer
15 years 10 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
RAID
2007
Springer
15 years 10 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
SSS
2007
Springer
15 years 10 months ago
The Truth System: Can a System of Lying Processes Stabilize?
We introduce a new abstract system, called the truth system. In the truth system, a process deduces a true value, with high probability, from an incoming stream of both true and fa...
Mohamed G. Gouda, Yan Li
« Prev « First page 1300 / 1455 Last » Next »