Sciweavers

8135 search results - page 1496 / 1627
» network 2008
Sort
View
IEEEARES
2008
IEEE
15 years 10 months ago
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Marti...
117
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
124
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
142
Voted
IJCNN
2008
IEEE
15 years 10 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn
126
Voted
IJCNN
2008
IEEE
15 years 10 months ago
A neural wake-sleep learning architecture for associating robotic facial emotions
—A novel wake-sleep learning architecture for processing a robot’s facial expressions is introduced. According to neuroscience evidence, associative learning of emotional respo...
Chi-Yung Yau, Kevin Burn, Stefan Wermter
« Prev « First page 1496 / 1627 Last » Next »