Sciweavers

2777 search results - page 449 / 556
» The Challenges of Service Evolution
Sort
View
ICW
2005
IEEE
209views Communications» more  ICW 2005»
14 years 3 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
ISDA
2005
IEEE
14 years 3 months ago
Hybrid Fuzzy-Genetic Algorithm Approach for Crew Grouping
Crew grouping is an important problem and formulating a good solution always involves many challenges. For example, grouping soldiers intelligently to tank combat units, we should...
Hongbo Liu, Zhanguo Xu, Ajith Abraham
ITCC
2005
IEEE
14 years 3 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
LCN
2005
IEEE
14 years 3 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
MOBIQUITOUS
2005
IEEE
14 years 3 months ago
Personal AP Protocol for Mobility Management in IEEE 802.11 Systems
—In mobile wireless systems, the quest to support delay-stringent multimedia applications challenges most existing solutions to the mobility support and traffic management proble...
Lei Zan, Jidong Wang, Lichun Bao