Sciweavers

12637 search results - page 122 / 2528
» Security for Extensible Systems
Sort
View
TON
2012
11 years 11 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
AICT
2010
IEEE
240views Communications» more  AICT 2010»
13 years 22 days ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
VR
2003
IEEE
141views Virtual Reality» more  VR 2003»
14 years 2 months ago
Device Independence and Extensibility in Gesture Recognition
Gesture recognition techniques often suffer from being highly device-dependent and hard to extend. If a system is trained using data from a specific glove input device, that syst...
Jacob Eisenstein, Shahram Ghandeharizadeh, Leana G...
CGA
2008
13 years 9 months ago
Virtual Classroom Extension for Effective Distance Education
We present the design, implementation, and initial results of a system for remote lecture attendance based on extending on-campus classrooms to accommodate remotely located studen...
Radu Dondera, Chun Jia, Voicu Popescu, Cristina Ni...
NOMS
2000
IEEE
14 years 1 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt