Sciweavers

5123 search results - page 116 / 1025
» Performance and Security Tradeoff
Sort
View
ACSAC
1998
IEEE
15 years 8 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
SUTC
2006
IEEE
15 years 10 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
AGENTS
2000
Springer
15 years 9 months ago
SIAS: a secure shopping information agent system
In this paper, we build a Shopping Information Agent System (SIAS) based on mobile agent technology. We discuss possible security attacks by malicious hosts to agents in the syste...
Anthony H. W. Chan, Tsz Yeung Wong, Caris K. M. Wo...
INFOCOM
2009
IEEE
15 years 11 months ago
Understanding the Performance Gap Between Pull-Based Mesh Streaming Protocols and Fundamental Limits
—Pull-based mesh streaming protocols have recently received much research attention, with successful commercial systems showing their viability in the Internet. Despite the remar...
Chen Feng, Baochun Li, Bo Li
ECBS
2006
IEEE
126views Hardware» more  ECBS 2006»
15 years 10 months ago
Experiments and Investigations for the Personal High Performance Computing (PHPC) built on top of the 64-bit processing and clus
The motivation and objective for this paper is to demonstrate “Personal High Performance Computing (PHPC)”, which requires only a smaller number of computers, resources and sp...
Victor Chang