Sciweavers

2809 search results - page 531 / 562
» Applications of Expert Systems to the Design of Telecommunic...
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
14 years 1 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
COMPGEOM
1997
ACM
14 years 17 hour ago
Realistic Input Models for Geometric Algorithms
Many algorithms developed in computational geometry are needlessly complicated and slow because they have to be prepared for very complicated, hypothetical inputs. To avoid this, ...
Mark de Berg, Matthew J. Katz, A. Frank van der St...
WICON
2008
13 years 9 months ago
Seamless content delivery
Widespread and affordable broadband access opens up opportunities for delivery of new streaming services. However, what is expected to fundamentally change the way that people use...
Theodore Zahariadis, George Leoleis, Thomas Schier...
JNSM
2007
138views more  JNSM 2007»
13 years 7 months ago
High-Speed Dynamic Packet Filtering
One problem encountered while monitoring gigabit networks, is the need to filter only those packets that are interesting for a given task while ignoring the others. Popular packet...
Luca Deri