Sciweavers

551 search results - page 2 / 111
» Preventing existence
Sort
View
SIGCOMM
2012
ACM
11 years 8 months ago
Dismantling intrusion prevention systems
This paper introduces a serious security problem that people believe has been fixed, but which is still very much existing and evolving, namely evasions. We describe how protocols...
Olli-Pekka Niemi, Antti Levomäki, Jukka Manne...
DSRT
2009
IEEE
13 years 3 months ago
An Aspect-Oriented Approach for Disaster Prevention Simulation Workflows on Supercomputers, Clusters, and Grids
Computer simulation is an important factor in today's disaster prevention procedures. Simulation codes assess the evolution and impact of various physical phenomena in domains...
Tudor B. Ionescu, Andreas Piater, Walter Scheuerma...
DCOSS
2010
Springer
13 years 9 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
GLOBECOM
2009
IEEE
14 years 24 days ago
Crosstalk-Preventing Scheduling in AWG-Based Cell Switches
—AWG-based optical switching fabrics are affected by coherent crosstalk, that can significantly impair system operation when the same wavelength is used simultaneously on severa...
Andrea Bianco, David Hay, Fabio Neri
IJACTAICIT
2010
84views more  IJACTAICIT 2010»
13 years 26 days ago
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions
The theory of regions has been recognized as the optimal deadlock prevention policy based on the marking/transition-separation instance (MTSI) or the event-state-separation-proble...
Yi-Sheng Huang, Yen-Liang Pan