Sciweavers

12637 search results - page 2506 / 2528
» Security for Extensible Systems
Sort
View
FSS
2006
140views more  FSS 2006»
13 years 7 months ago
Advances and challenges in interval-valued fuzzy logic
Among the various extensions to the common [0, 1]-valued truth degrees of "traditional" fuzzy set theory, closed intervals of [0, 1] stand out as a particularly appealin...
Chris Cornelis, Glad Deschrijver, Etienne E. Kerre
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 7 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
JCM
2008
242views more  JCM 2008»
13 years 7 months ago
SimANet - A Large Scalable, Distributed Simulation Framework for Ambient Networks
In this paper, we present a new simulation platform for complex, radio standard spanning mobile Ad Hoc networks. SimANet - Simulation Platform for Ambient Networks - allows the coe...
Matthias Vodel, Matthias Sauppe, Mirko Caspar, Wol...
CORR
2007
Springer
133views Education» more  CORR 2007»
13 years 7 months ago
On Decidability Properties of Local Sentences
Local (first order) sentences, introduced by Ressayre, enjoy very nice decidability properties, following from some stretching theorems stating some remarkable links between the ...
Olivier Finkel
JNW
2006
126views more  JNW 2006»
13 years 7 months ago
Gateway Deployment optimization in Cellular Wi-Fi Mesh Networks
With the standardization of IEEE 802.11, there has been an explosive growth of wireless local area networks (WLAN). Recently, this cost effective technology is being developed aggr...
Rajesh Prasad, Hongyi Wu
« Prev « First page 2506 / 2528 Last » Next »