Sciweavers

237 search results - page 26 / 48
» Logic-based Network Configuration and Management
Sort
View
POLICY
2001
Springer
14 years 3 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
IATA
1998
Springer
14 years 3 months ago
Agent-Based Schemes for Plug-And-Play Network Components
In this paper, we present several approaches to making the process of configuring network devices easier than is currently the case. Configuring a device requires that a number of ...
Andrzej Bieszczad, Syed Kamran Raza, Bernard Pagur...
JCP
2007
181views more  JCP 2007»
13 years 10 months ago
Reducing Energy Consumption of Wireless Sensor Networks through Processor Optimizations
When the environmental conditions are stable, a typical Wireless Sensor Network (WSN) application may sense and process very similar or constant data values for long durations. Thi...
Gürhan Küçük, Can Basaran
POLICY
2001
Springer
14 years 3 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
WSC
2007
14 years 1 months ago
Using event simulation to evaluate internet protocol enhancements for special services
Disasters can cause extraordinary service demand by the public, while concurrently causing outages that reduce network capacity to serve the surging demand. It is imperative that ...
David A. Garbin, Patrick V. McGregor, Denise M. Be...