Sciweavers

1353 search results - page 26 / 271
» Securing Current and Future Process Control Systems
Sort
View
173
Voted
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 3 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
SAC
2011
ACM
14 years 5 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
HYBRID
1997
Springer
15 years 6 months ago
Controller Scheduling Using Neural Networks: Implementation and Experimental Results
This paper presents the results of simulation and control experiments using a recently proposed method for real-time switching among a pool of controllers. The switching strategy ...
Enrique D. Ferreira, Bruce H. Krogh
130
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
103
Voted
IJWBC
2008
120views more  IJWBC 2008»
15 years 2 months ago
Internet governance: towards a non-representational democracy
: Internet governance is a contentious topic referring to the global control and management of key internet resources such as IP addresses. Research suggests that the existence of ...
Martin Hans Knahl, Geoff Cox