Sciweavers

CN
2004
106views more  CN 2004»
13 years 4 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
DLS
2005
101views Languages» more  DLS 2005»
13 years 7 months ago
Flexible object encapsulation for ambient-oriented programming
In the emerging field of Ambient Intelligence (AmI), software is deployed in wireless open networks of mobile devices. Such open networks require stringent security measures as u...
Wolfgang De Meuter, Éric Tanter, Stijn Most...
CDC
2008
IEEE
100views Control Systems» more  CDC 2008»
13 years 7 months ago
Input-output instability patterns of Chemical Reaction Networks
This paper describes a criterion for qualitative analysis of open Chemical Reaction Networks endowed with mass-action kinetics. The method can be applied to an extremely broad clas...
David Angeli
NDSS
1999
IEEE
13 years 9 months ago
An Algebra for Assessing Trust in Certification Chains
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes a...
Audun Jøsang
IH
2001
Springer
13 years 9 months ago
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks
As digital technology over open networks evolves, commercialization of video streams is coming of age. Traditional models for video stream commercialization suffer from copyright ...
Dimitris Thanos