Sciweavers

96 search results - page 10 / 20
» hicss 2010
Sort
View
HICSS
2010
IEEE
205views Biometrics» more  HICSS 2010»
14 years 4 months ago
Loadable Hypervisor Modules
The topic of virtualization has received renewed attention. Xen is a popular open source type-I hypervisor. The Xen hypervisor currently has limited capabilities for runtime modi...
Thomas Naughton, Geoffroy Vallée, Stephen L...
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
14 years 4 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
14 years 4 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
HICSS
2010
IEEE
145views Biometrics» more  HICSS 2010»
14 years 4 months ago
Dynamics of an Economics Model for Generation Coupled to the OPA Power Transmission Model
In this paper we explore the interaction between a dynamic model of the power transmission system (OPA) and a simple economic model of power generation development. Despite the si...
Benjamin A. Carreras, David E. Newman, Matthew Zei...
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
14 years 4 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...