Sciweavers

370 search results - page 74 / 74
» Towards Trust-Aware Resource Management in Grid Computing Sy...
Sort
View
ESORICS
2010
Springer
13 years 5 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
FASE
2008
Springer
13 years 7 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
CAISE
2004
Springer
13 years 10 months ago
An Approach to the Enterprise Integration
This paper describes the evolution and the results of the research work carried out by the IRIS group in the field of enterprise integration. This research work began with the ARD...
Ricardo Chalmeta, Reyes Grangel, Cristina Campos, ...
CN
2008
176views more  CN 2008»
13 years 5 months ago
ARQ-based cross-layer optimization for wireless multicarrier transmission on cognitive radio networks
The primary feature of cognitive radios for wireless communication systems is the capability to optimize the relevant communication parameters given a dynamic wireless channel env...
Alexandre de Baynast, Petri Mähönen, Mar...

Publication
293views
15 years 3 months ago
Using Archived Data to Generate Transit Performance Measures.
Measuring the performance of a transit system is the first step toward efficient and proactive management. In recent years, the use of performance measures for transportation plan...
R. L. Bertini, A. M. El-Geneidy