Sciweavers

511 search results - page 59 / 103
» Organization Detection Using Emergent Computing
Sort
View
ACMSE
2008
ACM
13 years 10 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
COMPUTER
2002
196views more  COMPUTER 2002»
13 years 7 months ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...
IAAI
1990
13 years 9 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
WORDS
2005
IEEE
14 years 1 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
ICRA
2008
IEEE
143views Robotics» more  ICRA 2008»
14 years 2 months ago
How morphology affects self-assembly in a stochastic modular robot
Abstract— Self-assembly is a process through which an organized structure can spontaneously form from simple parts. Taking inspiration from biological examples of self-assembly, ...
Shuhei Miyashita, Max Kessler, Marco Lungarella