Sciweavers

151 search results - page 27 / 31
» On Testing for Absence of Rights in Access Control Models
Sort
View
WINET
2010
97views more  WINET 2010»
13 years 5 months ago
Routing in the frequency domain
Abstract The design of single transceiver based multichannel multi-hop wireless mesh networks focuses on the trade-off between rapid neighbor synchronization and maximizing the usa...
Jay A. Patel, Haiyun Luo, Indranil Gupta
RAID
2004
Springer
14 years 22 days ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
ICNP
2006
IEEE
14 years 1 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
ICSE
2003
IEEE-ACM
14 years 7 months ago
RUPi - A Unified Process that Integrates Human-Computer Interaction and Software Engineering
This research has the main objective of presenting a study on the areas of Human-Computer Interaction (HCI) and Software Engineering (SE), focusing on the importance of integratin...
Kênia Soares Sousa, Elizabeth Furtado
ICMLA
2009
14 years 4 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa