Sciweavers

644 search results - page 125 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
RAID
2009
Springer
14 years 1 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
CCGRID
2006
IEEE
14 years 23 days ago
SSB : A Grid-based Infrastructure for HLA Systems
Service Oriented EXtensible Modeling and Simulation Supporting Environment Architecture (SO-XMSSEA) is presented based on XMSF thinking and the new technology development of web s...
Xu Li-juan, Peng Xiao-yuan
CCS
2008
ACM
13 years 8 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
SIGCOMM
1996
ACM
13 years 11 months ago
Receiver-Driven Layered Multicast
State of the art, real-time, rate-adaptive, multimedia applications adjust their transmission rate to match the available network capacity. Unfortunately, this source-based rate-a...
Steven McCanne, Van Jacobson, Martin Vetterli
EWSN
2008
Springer
14 years 6 months ago
A Component Framework for Content-Based Publish/Subscribe in Sensor Networks
Component-based architectures are the traditional approach cile application specific optimization with reusable abstractions in sensor networks. However, they frequently overwhelm ...
Adam Wolisz, Andreas Köpke, Andreas Willig, J...