Sciweavers

582 search results - page 79 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
ISJGP
2007
146views more  ISJGP 2007»
13 years 7 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
MOBIHOC
2003
ACM
14 years 7 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
SIGMETRICS
2008
ACM
106views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Fully decentralized emulation of best-effort and processor sharing queues
Control of large distributed cloud-based services is a challenging problem. The Distributed Rate Limiting (DRL) paradigm was recently proposed as a mechanism for tackling this pro...
Rade Stanojevic, Robert Shorten
AGENTS
1999
Springer
13 years 12 months ago
Exception Handling in Agent Systems
A critical challenge to creating effective agent-based systems is allowing them to operate effectively when the operating environment is complex, dynamic, and error-prone. In this...
Mark Klein, Chrysanthos Dellarocas
SIGUCCS
2003
ACM
14 years 28 days ago
Putting OSX in an open access lab: (or "The Joy of X")
This paper discusses the challenges of putting Apple Macintosh OSX into open access and computer lab environments. Categories and Subject Descriptors K.6.4 [Management of Computin...
David L. R. Houston