Sciweavers

25316 search results - page 4806 / 5064
» Computational sensor networks
Sort
View
RAID
2004
Springer
15 years 9 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
WISA
2004
Springer
15 years 9 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traf...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
DISCEX
2003
IEEE
15 years 9 months ago
Willow System Demonstration
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modern critical applica...
John C. Knight, Jonathan Hill, Philip E. Varner, P...
HICSS
2003
IEEE
147views Biometrics» more  HICSS 2003»
15 years 9 months ago
Balancing Energy Saving and QoS in the Mobile Internet: An Application-Independent Approach
The scarcity of energetic resources in mobile computers is a very limiting factor. In this paper we propose a solution that tries to balance energy consumption and QoS requirement...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 9 months ago
Experimental Studies and Modeling of an Information Embedded Power System
This paper develops a model of an electrical power system, with its inherent embedded communication system, for the purpose of studying the characteristics of power system measure...
Stephen P. Carullo, Chika Nwankpa
« Prev « First page 4806 / 5064 Last » Next »