Sciweavers

4385 search results - page 792 / 877
» Abstraction for Concurrent Objects
Sort
View
SICHERHEIT
2010
14 years 9 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
TRIDENTCOM
2010
IEEE
14 years 9 months ago
How to Build Complex, Large-Scale Emulated Networks
Abstract. This paper describes AutoNetkit, an auto-configuration tool for complex network emulations using Netkit, allowing large-scale networks to be tested on commodity hardware....
Hung X. Nguyen, Matthew Roughan, Simon Knight, Nic...
TRIDENTCOM
2010
IEEE
14 years 9 months ago
COMCON: Use Cases for Virtual Future Networks
Abstract-- It is expected from a Future Internet that a multitude of networks will coexist and complement each other. Such environment allows to run specialized networks possibly p...
Daniel Schlosser, Marco Hoffmann, Tobias Hoß...
AVSS
2009
IEEE
14 years 8 months ago
Counting People in Groups
Abstract--Cameras are becoming a common tool for automated vision purposes due to their low cost. In an era of growing security concerns, camera surveillance systems have become no...
Duc Fehr, Ravishankar Sivalingam, Vassilios Morell...
CDC
2009
IEEE
210views Control Systems» more  CDC 2009»
14 years 8 months ago
On maximum lifetime routing in Wireless Sensor Networks
Abstract-- Lifetime maximization is an important optimization problem specific to Wireless Sensor Networks (WSNs) since they operate with limited energy resources which are therefo...
Xu Ning, Christos G. Cassandras