Sciweavers

334 search results - page 62 / 67
» Inapproximability of Survivable Networks
Sort
View
DBSEC
2001
115views Database» more  DBSEC 2001»
13 years 10 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
IADIS
2003
13 years 10 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
ICASSP
2010
IEEE
13 years 6 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
DSN
2003
IEEE
14 years 1 months ago
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques
The presence of physical obstacles and radio interference results in the so called “shadow regions” in wireless networks. When a mobile station roams into a shadow region, it ...
Dongyan Chen, Sachin Garg, Chandra M. R. Kintala, ...
EAGC
2003
Springer
14 years 1 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...