Sciweavers

112 search results - page 11 / 23
» Conjunctive Artifact-Centric Services
Sort
View
SUTC
2006
IEEE
14 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ATAL
2003
Springer
14 years 2 months ago
Representation and reasoning for DAML-based policy and domain services in KAoS and nomads
To increase the assurance with which agents can be deployed in operational settings, we have been developing the KAoS policy and domain services. In conjunction with Nomads strong...
Jeffrey M. Bradshaw, Andrzej Uszok, Renia Jeffers,...
DIM
2009
ACM
14 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 4 months ago
Channel Protection with Real-Time and In-Service Performance Monitoring for Next Generation Secure WDM Networks
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
Stamatios V. Kartalopoulos
ICN
2001
Springer
14 years 2 months ago
A Buffer-Management Scheme for Bandwidth and Delay Differentiation Using a Virtual Scheduler
—This paper presents a new scalable buffer-management scheme for IP Differentiated Services. The scheme consists of a Differentiated Random Drop (DRD) algorithm using feedback fr...
Roman Pletka, Patrick Droz, Burkhard Stiller