Sciweavers

3605 search results - page 624 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
KES
2005
Springer
14 years 3 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
MDM
2005
Springer
127views Communications» more  MDM 2005»
14 years 3 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
ISI
2004
Springer
14 years 3 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe
NPC
2004
Springer
14 years 3 months ago
Paramecium: Assembling Raw Nodes into Composite Cells
In conventional DHTs, each node is assigned an exclusive slice of identifier space. Simple it is, such arrangement may be rough. In this paper we propose a generic component struc...
Ming Chen, Guangwen Yang, Yongwei Wu, Xuezheng Liu
OOPSLA
2004
Springer
14 years 3 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman