Sciweavers

1293 search results - page 128 / 259
» The infrastructure problem in HCI
Sort
View
APNOMS
2009
Springer
14 years 4 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
DSOM
2009
Springer
14 years 4 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
ICPP
2008
IEEE
14 years 4 months ago
Overcoming Scalability Challenges for Tool Daemon Launching
: Many tools that target parallel and distributed environments must co-locate a set of daemons with the distributed processes of the target application. However, efficient and por...
Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supins...
VTC
2008
IEEE
116views Communications» more  VTC 2008»
14 years 4 months ago
An Adaptive Vehicle Route Management Solution Enabled by Wireless Vehicular Networks
— In order to accommodate the constantly growing number of vehicles on the road with which infrastructure provision is failing to cope, new means of optimizing the available road...
Kevin Collins, Gabriel-Miro Muntean
WETICE
2007
IEEE
14 years 3 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi