Sciweavers

3370 search results - page 637 / 674
» Adding Networks
Sort
View
CCS
2003
ACM
15 years 5 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
NOMS
2002
IEEE
104views Communications» more  NOMS 2002»
15 years 4 months ago
Remote MIB-item look-up service
: Despite some deficiencies, the Internet management framework is widely deployed and thousands of Management Information Base (MIB) modules have been defined thus far. These modul...
Aiko Pras, Szabolcs Boros, Bert Helthuis
ICOIN
2001
Springer
15 years 4 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
ISORC
2000
IEEE
15 years 4 months ago
Deadline Handling in Real-Time Distributed Objects
: Deadline handling is a fundamental part of real-time computing but has been practiced in ad hoc forms for decades. A general framework for systematic deadline handling in real-ti...
K. H. Kim, Juqiang Liu, Moon-hae Kim
HCW
1999
IEEE
15 years 4 months ago
Are CORBA Services Ready to Support Resource Management Middleware for Heterogeneous Computing?
The goal of this paper is to report our ndings as to which CORBA services are ready to support distributed system software in a heterogeneous environment. In particular, we implem...
Alpay Duman, Debra A. Hensgen, David St. John, Tay...