Sciweavers

165 search results - page 21 / 33
» Cloud Computing - The Next Revolution in Information Technol...
Sort
View
CSREAPSC
2006
14 years 11 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
IADIS
2004
14 years 11 months ago
Jill (Just-in-Location Learning)
Wireless technologies are poised to bring major changes in the information infrastructure, transforming communications and facilitating information retrieval. Over the next severa...
Joaquin Ruiz, Susan Wheeler
SECURWARE
2008
IEEE
15 years 4 months ago
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, suc...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
LCN
2006
IEEE
15 years 3 months ago
Wireless Sensor Networks: The Quest for Planetary Field Sensing
— The paper presents a thought experiment as to the feasibility of using large scale wireless sensor networks as a vehicle for high level scientific investigation. The discussion...
Elena I. Gaura, Robert M. Newman
NCA
2003
IEEE
15 years 3 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...