Sciweavers

301 search results - page 60 / 61
» Designing protocols for agent institutions
Sort
View
AHSWN
2006
206views more  AHSWN 2006»
13 years 6 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
MOBICOM
2003
ACM
13 years 11 months ago
DIRAC: a software-based wireless router system
Routers are expected to play an important role in the IPbased wireless data network. Although a substantial number of techniques have been proposed to improve wireless network per...
Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo...
BMCBI
2010
103views more  BMCBI 2010»
13 years 6 months ago
Virtual Screening of potential drug-like inhibitors against Lysine/DAP pathway of Mycobacterium tuberculosis
Background: An explosive global spreading of multidrug resistant Mycobacterium tuberculosis (Mtb) is a catastrophe, which demands an urgent need to design or develop novel/potent ...
Aarti Garg, Rupinder Tewari, Gajendra P. S. Raghav...
TRUST
2009
Springer
14 years 22 days ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
DIM
2009
ACM
14 years 20 days ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy