Sciweavers

1323 search results - page 202 / 265
» Updatable Security Views
Sort
View
DISCEX
2003
IEEE
14 years 1 months ago
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays
1 Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target fo...
Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, La...
AGENTS
2000
Springer
14 years 2 days ago
Exchanging tacit community knowledge by talking-virtualized-egos
This paper describes a method of exchanging tacit community knowledge using talking-virtualized-egos. We aim at sharing tacit knowledge in a community, for this purpose, we propos...
Hidekazu Kubota, Toyoaki Nishida, Tomoko Koda
AGENTS
2000
Springer
14 years 2 days ago
Hormone-based control for self-reconfigurable robots
Self-reconfigurable or metamorphic robots can change their individual and collective shape and size to meet operational demands. Since these robots are constructed from a set of a...
Wei-Min Shen, Yimin Lu, Peter M. Will
ACSAC
1999
IEEE
14 years 1 days ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
INFOCOM
1999
IEEE
14 years 13 hour ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker