Sciweavers

1737 search results - page 15 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ICSOC
2009
Springer
13 years 5 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...
IJON
2002
120views more  IJON 2002»
13 years 7 months ago
The recognition and analysis of animate objects using neural networks and active contour models
: In this paper we describe a method for tracking walking humans in the visual field. Active contour models are used to track moving objects in a sequence of images. The resulting ...
Ken Tabb, Neil Davey, Rod Adams, Stella J. George
MSWIM
2005
ACM
14 years 1 months ago
Content and service replication strategies in multi-hop wireless mesh networks
Emerging multi-hop wireless mesh networks have much different characteristics than the Internet. They have low dimensionality and large diameters. Content and service replication ...
Shudong Jin, Limin Wang
PERCOM
2005
ACM
14 years 7 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong