Sciweavers

1737 search results - page 69 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
IWANN
2005
Springer
14 years 2 months ago
A Competitive-Based Method for Determining the Number of Groups: A Clinical Application
A proper gait assessment in patients with knee or hip injuries strongly determines the diagnosis and consequently the evolution of the pathology, the quality of life of implanted p...
Antonio Sánchez, Francisco J. Vico, Santiag...
ACSAC
2001
IEEE
14 years 24 days ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
WIOPT
2005
IEEE
14 years 2 months ago
Optimal Controlled Flooding Search in a Large Wireless Network
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large wireless network. We consider the class of controlled flo...
Nicholas B. Chang, Mingyan Liu
NOMS
2010
IEEE
194views Communications» more  NOMS 2010»
13 years 7 months ago
Analysis of P2P file sharing network's credit system for fairness management
Fairness is an important management issue for peer-to-peer file sharing systems. In this paper, we study the credit system of the P2P file sharing network eMule (http://www.emule-p...
Yunzhao Li, Don Gruenbacher
SPRINGSIM
2007
13 years 10 months ago
Modeling and analysis of worm defense using stochastic activity networks
— Stochastic activity networks (SANs) are a widely used formalism for describing complex systems that have random behavior. Sophisticated software tools exist for the modeling an...
David M. Nicol, Steve Hanna, Frank Stratton, Willi...