Sciweavers

Share
ISSADS
2005
Springer
10 years 19 days ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
ISSADS
2005
Springer
10 years 19 days ago
Model Fragmentation for Distributed Workflow Execution: A Petri Net Approach
Workflow is the key technology for business process automation, while distributed workflow is the solution to deal with the decentralized nature of workflow applications and the pe...
Wei Tan, Yushun Fan
ISSADS
2005
Springer
10 years 19 days ago
Interpretation of UML Sequence Diagrams as Causality Flows
Christophe Sibertin-Blanc, Omar Tahir, Janette Car...
ISSADS
2005
Springer
10 years 19 days ago
Implementing Distributed Mutual Exclusion on Multithreaded Environments: The Alien-Threads Approach
We present a simple implementation of a token-based distributed mutual exclusion algorithm for multithreaded systems. Several per-node requests could be issued by threads running ...
Federico Meza, Jorge Pérez R., Yadran Etero...
ISSADS
2005
Springer
10 years 19 days ago
Architecture for Media Streaming Delivery over P2P Networks
Peer-to-Peer networks (P2P) exhibit specific characteristics that can be exploited for media streaming delivery. In this paper we propose a P2Pbased architecture for video streamin...
Francisco de Asís López-Fuentes, Eck...
ISSADS
2005
Springer
10 years 19 days ago
Database System Architecture - A Walk Through Time: From Centralized Platform to Mobile Computing - Keynote Address
Classical distributed database systems monolithically offer distribution transparency and higher performance. This is made possible by making data available and closer to the appl...
Ali R. Hurson, Yu Jiao
ISSADS
2005
Springer
10 years 19 days ago
Extending Databases to Precision-Controlled Retrieval of Qualitative Information
A hierarchy is an arrangement of qualitative values in a tree with certain properties. Hierarchies allow to define the confusion conf(r, s) in using qualitative value r instead of ...
Victor-Polo de Gyves, Adolfo Guzmán-Arenas,...
ISSADS
2005
Springer
10 years 19 days ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user proļ¬le characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ISSADS
2005
Springer
10 years 19 days ago
Data Hiding in Identification and Offset IP Fields
Abstract. . Steganography is defined as the art and science of hiding information, it takes one piece of information and hides it within another. The piece more used to hide inform...
Enrique Cauich, Roberto Gómez Cárden...
ISSADS
2005
Springer
10 years 19 days ago
Security Challenges of Distributed e-Learning Systems
Roberto Gómez Cárdenas, Erika Mata S...
books