Sciweavers

1054 search results - page 166 / 211
» From Mobility Management to Connectivity Management
Sort
View
CRITIS
2007
13 years 9 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
CCR
2007
108views more  CCR 2007»
13 years 7 months ago
Very low-cost internet access using KioskNet
Rural Internet kiosks in developing regions can cost-effectively provide communication and e-governance services to the poorest sections of society. A variety of technical and no...
Shimin Guo, Mohammad Hossein Falaki, Earl A. Olive...
PAAMS
2010
Springer
13 years 6 months ago
ASGARD - A Graphical Monitoring Tool for Distributed Agent Infrastructures
Abstract Monitoring the runtime behaviour of a distributed agent system for debugging or demonstration purposes provides a challenge to agent system developers. As a lot of the com...
Jakob Tonn, Silvan Kaiser
SJ
2011
13 years 2 months ago
Analyzing the Resilience of Complex Supply Network Topologies Against Random and Targeted Disruptions
—In this paper, we study the resilience of supply networks against disruptions and provide insights to supply chain managers on how to construct a resilient supply network from t...
Kang Zhao, Akhil Kumar, Terry P. Harrison, John Ye...
TMC
2010
137views more  TMC 2010»
13 years 2 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...