Sciweavers

2904 search results - page 557 / 581
» Internet Infrastructure Security
Sort
View
ALIFE
2006
13 years 8 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho
IANDC
2008
128views more  IANDC 2008»
13 years 8 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
CCR
2006
76views more  CCR 2006»
13 years 8 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
COMCOM
2006
154views more  COMCOM 2006»
13 years 8 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
IJNSEC
2006
82views more  IJNSEC 2006»
13 years 8 months ago
A Study of Micro-payment Based on One-way Hash Chain
Electronic payment systems have gradually become an important issue nowadays because of the popularity and importance of electronic commerce on the Internet. Security and convenie...
Min-Shiang Hwang, Pei-Chen Sung