Sciweavers

2699 search results - page 425 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ITICSE
2004
ACM
14 years 2 months ago
The backwash effect on SQL skills grading
This paper examines the effect of grading approaches for SQL query formulation on students’ learning strategies. The way that students are graded in a subject has a significant ...
Julia Coleman Prior, Raymond Lister
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
14 years 2 months ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
GCC
2004
Springer
14 years 2 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
CSREASAM
2006
13 years 10 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 10 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...