Sciweavers

2503 search results - page 379 / 501
» Building Computer Network Attacks
Sort
View
P2P
2006
IEEE
101views Communications» more  P2P 2006»
15 years 7 months ago
Towards Scalable Mobility in Distributed Hash Tables
For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, ...
Olaf Landsiedel, Stefan Götz, Klaus Wehrle
SASN
2005
ACM
15 years 7 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu
IPSN
2004
Springer
15 years 7 months ago
Modeling of sensor nets in Ptolemy II
This paper describes a modeling and simulation framework called VisualSense for wireless sensor networks that builds on and leverages Ptolemy II. This framework supports actor-ori...
Philip Baldwin, Sanjeev Kohli, Edward A. Lee, Xiao...
IDMS
1998
Springer
99views Multimedia» more  IDMS 1998»
15 years 5 months ago
Asynchronously Replicated Shared Workspaces for a Multi-Media Annotation Service over Internet
Abstract. This paper describes a world wide collaboration system through multimedia Post-its (user generated annotations). DIANE is a service to create multimedia annotations to ev...
Hartmut Benz, Maria Eva Lijding
B
2007
Springer
15 years 5 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet