Sciweavers

2645 search results - page 193 / 529
» Autonomous security for autonomous systems
Sort
View
RE
2005
Springer
15 years 10 months ago
Identifying Contingency Requirements Using Obstacle Analysis
This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...
ICNP
1999
IEEE
15 years 9 months ago
Policy Disputes in Path-Vector Protocols
The Border Gateway Protocol, BGP, is currently the only interdomain routing protocol employed on the Internet. As required of any interdomain protocol, BGP allows policy-based met...
Timothy Griffin, F. Bruce Shepherd, Gordon T. Wilf...
ATAL
2008
Springer
15 years 6 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...
141
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Secure Location Verification for Vehicular Ad-Hoc Networks
In this paper, we examine one of the security issues in vehicular ad-hoc network (VANETs): position-spoofing attack. We propose a novel Secure Location Verification (SLV) scheme to...
Joo-Han Song, Victor W. S. Wong, Vincent C. M. Leu...
107
Voted
SIGMOD
2004
ACM
115views Database» more  SIGMOD 2004»
16 years 4 months ago
Kanata: Adaptation and Evolution in Data Sharing Systems
In Toronto's Kanata project, we are investigating the integration and exchange of data and metadata in dynamic, autonomous environments. Our focus is on the development and m...
Periklis Andritsos, Ariel Fuxman, Anastasios Kemen...