Sciweavers

1266 search results - page 213 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
INTERNET
2008
150views more  INTERNET 2008»
13 years 8 months ago
Convenience Over Correctness
ion. First described in RFC 707,1 with implementation approaches and details later provided by Andrew Birrell and Bruce Nelson,2 RPC has influenced distributed systems research and...
Steve Vinoski
ATAL
2005
Springer
14 years 2 months ago
Controlling teams of uninhabited air vehicles
We describe a Multi-Agent System (MAS) for controlling teams of uninhabited air vehicles (UAVs) in the context of a larger system that has been used to evaluate potential concepts...
Jeremy W. Baxter, Graham S. Horn
MOBISYS
2008
ACM
14 years 8 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
SOSP
2003
ACM
14 years 5 months ago
Bullet: high bandwidth data dissemination using an overlay mesh
In recent years, overlay networks have become an effective alternative to IP multicast for efficient point to multipoint communication across the Internet. Typically, nodes self-...
Dejan Kostic, Adolfo Rodriguez, Jeannie R. Albrech...
GI
2004
Springer
14 years 1 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner