Sciweavers

1737 search results - page 319 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
IADIS
2003
13 years 10 months ago
Internet Geography: New Spaces of Information
The objective of great investments in telecommunication networks is to approach economies and put an end to the asymmetries. The most isolated regions could be the beneficiaries o...
Jorge Ricardo da Costa Ferreira
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 3 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
CCR
2007
110views more  CCR 2007»
13 years 9 months ago
Future internet research and experimentation: the FIRE initiative
The research community worldwide has increasingly drawn its attention to the weaknesses of the current Internet. Many proposals are addressing the perceived problems, ranging from...
Anastasius Gavras, Arto Karila, Serge Fdida, Marti...
BMCBI
2006
180views more  BMCBI 2006»
13 years 9 months ago
The Gaggle: An open-source software system for integrating bioinformatics software and data sources
Background: Systems biologists work with many kinds of data, from many different sources, using a variety of software tools. Each of these tools typically excels at one type of an...
Paul T. Shannon, David J. Reiss, Richard Bonneau, ...
CODES
2006
IEEE
14 years 3 months ago
Fuzzy decision making in embedded system design
The use of Application Specific Instruction-set Processors (ASIP) is a solution to the problem of increasing complexity in embedded systems design. One of the major challenges in...
Alessandro G. Di Nuovo, Maurizio Palesi, Davide Pa...