Sciweavers

2780 search results - page 180 / 556
» Agents in Proactive Environments
Sort
View
AUSFORENSICS
2004
15 years 6 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
IJSC
2008
95views more  IJSC 2008»
15 years 4 months ago
Beyond Information Silos - an Omnipresent Approach to Software Evolution
ifferent abstraction levels, resulting in isolated `information silos'. An increasing number of task-specific software tools aim to support developers, but this often results ...
Juergen Rilling, René Witte, Philipp Sch&uu...
COMCOM
2007
82views more  COMCOM 2007»
15 years 4 months ago
Jumping ant routing algorithm for sensor networks
Enterprises that may rely on critical equipments which are constantly moving around, for example, hospitals – need to ensure they can know the current location of vital but mobi...
Wei-Ming Chen, Chung-Sheng Li, Fu-Yu Chiang, Han-C...
JCM
2007
103views more  JCM 2007»
15 years 4 months ago
Seamless Handover For Unidirectional Broadcast Access Networks In Mobile IPv6
Mechanisms and protocol interactions for seamless handover of mobile multicast/broadcast services using unidirectional access networks in heterogeneous Mobile IP infrastructures ar...
Ilka Miloucheva, Jens Mödeker, Karl Jonas, Di...
CIB
2004
83views more  CIB 2004»
15 years 4 months ago
Web-Based Semantic Pervasive Computing Services
Abstract-- Pervasive Computing refers to a seamless and invisible computing environment which provides dynamic, proactive and context-aware services to the user by acquiring contex...
Yugyung Lee, Soon Ae Chun, James Geller