Sciweavers

5488 search results - page 974 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
145
Voted
ANSS
2003
IEEE
15 years 10 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
CCGRID
2003
IEEE
15 years 10 months ago
Recovering Internet Symmetry in Distributed Computing
This paper describes two systems to recover the Internet connectivity impaired by private networks and firewalls. These devices cause asymmetry in the Internet, making peer-to-pee...
Se-Chang Son, Miron Livny
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
15 years 10 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
ICEIS
2003
IEEE
15 years 10 months ago
Toxic Farm: A Cooperative Management Platform for Virtual Teams and Enterprises
: The proliferation of the Internet has revolutionized the way people work together for business. People located at remote places can collaborate across organizational and national...
Hala Skaf-Molli, Pascal Molli, Gérald Oster...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 9 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...