Sciweavers

2517 search results - page 363 / 504
» Secure Deployment of Components
Sort
View
ICPP
2007
IEEE
14 years 3 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
IEEEIAS
2007
IEEE
14 years 3 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
MUE
2007
IEEE
116views Multimedia» more  MUE 2007»
14 years 3 months ago
Towards High Quality Mobile Services for Senior Citizens in Smart Living Environments
The aging of our society presents a range of challenges to housing providers. With the advanced mobile technologies we are now able to develop quality mobile services to help seni...
Xiaosong Zheng, Petri Pulli
ACCV
2007
Springer
14 years 3 months ago
Task Scheduling in Large Camera Networks
Camera networks are increasingly being deployed for security. In most of these camera networks, video sequences are captured, transmitted and archived continuously from all cameras...
Ser-Nam Lim, Larry S. Davis, Anurag Mittal
ATC
2007
Springer
14 years 3 months ago
A Distributed Self-healing Data Store
Due to the huge amount of integrated devices and sensors in everyday objects ubiquitous systems are in vicinity and will be deployed in large scales in the near future. We expect t...
Wolfgang Trumler, Jörg Ehrig, Andreas Pietzow...