Sciweavers

3008 search results - page 176 / 602
» Mechanisms for Importing Modules
Sort
View
ACSW
2006
15 years 6 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
ATAL
2010
Springer
15 years 5 months ago
Assignment problem in requirements driven agent collaboration and its implementation
Requirements Driven Agent Collaboration (RDAC) is a mechanism where the self-interested service agents actively and autonomously search for the required services submitted by the ...
Jian Tang, Zhi Jin
COMCOM
2006
82views more  COMCOM 2006»
15 years 4 months ago
Traffic engineering with OSPF-TE and RSVP-TE: Flooding reduction techniques and evaluation of processing cost
This paper considers two important aspects related to the control plane of Traffic Engineered IP/MPLS networks: the ``flooding reduction'' mechanisms and the evaluation ...
Stefano Salsano, Alessio Botta, Paola Iovanna, Mar...
FGCS
2010
111views more  FGCS 2010»
15 years 3 months ago
Autonomic metered pricing for a utility computing service
An increasing number of providers are offering utility computing services which require users to pay only when they use. Most of these providers currently charge users for metere...
Chee Shin Yeo, Srikumar Venugopal, Xingchen Chu, R...
TRUST
2010
Springer
15 years 3 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...