Sciweavers

388 search results - page 64 / 78
» Communication chains and multitasking
Sort
View
HPCC
2005
Springer
14 years 1 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
ICICS
2005
Springer
14 years 1 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
ICMI
2003
Springer
99views Biometrics» more  ICMI 2003»
14 years 1 months ago
Using an autonomous cube for basic navigation and input
This paper presents a low-cost and practical approach to achieve basic input using a tactile cube-shaped object, augmented with a set of sensors, processor, batteries and wireless...
Kristof Van Laerhoven, Nicolas Villar, Albrecht Sc...
ANSS
2002
IEEE
14 years 28 days ago
Simulation of a Vehicle Traffic Control Network Using a Fuzzy Classifier System
A Complex Adaptive System (CAS) is a network of communicating, intelligent agents where each agent adapts its behavior in order to collaborate with other agents to achieve overall...
John R. Clymer
SAINT
2002
IEEE
14 years 26 days ago
Ubiquitous Commerce - Always On, Always Aware, Always Pro-active
The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill define...
Anatole Gershman