Sciweavers

1168 search results - page 211 / 234
» An Infrastructure for Adaptable Middleware
Sort
View
ICSE
1999
IEEE-ACM
14 years 1 months ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...
GLOBECOM
2009
IEEE
14 years 29 days ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
APWEB
2006
Springer
14 years 26 days ago
Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links
A Connected Dominating Set (CDS) can serve as a virtual backbone for a wireless sensor network since there is no fixed infrastructure or centralized management in wireless sensor n...
Ding-Zhu Du, My T. Thai, Yingshu Li, Dan Liu, Shiw...
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
14 years 26 days ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
COOPIS
2004
IEEE
14 years 26 days ago
Intellectual Property Rights Management Using a Semantic Web Information System
IPR (Intellectual Property Rights) Management is a complex domain. The IPR field is structured by evolving regulations, practises, business models,... Therefore, DRMS (Digital Righ...
Roberto García, Rosa Gil, Jaime Delgado