Sciweavers

388 search results - page 64 / 78
» Communication chains and multitasking
Sort
View
HPCC
2005
Springer
15 years 3 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
ICICS
2005
Springer
15 years 2 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
ICMI
2003
Springer
99views Biometrics» more  ICMI 2003»
15 years 2 months ago
Using an autonomous cube for basic navigation and input
This paper presents a low-cost and practical approach to achieve basic input using a tactile cube-shaped object, augmented with a set of sensors, processor, batteries and wireless...
Kristof Van Laerhoven, Nicolas Villar, Albrecht Sc...
ANSS
2002
IEEE
15 years 2 months ago
Simulation of a Vehicle Traffic Control Network Using a Fuzzy Classifier System
A Complex Adaptive System (CAS) is a network of communicating, intelligent agents where each agent adapts its behavior in order to collaborate with other agents to achieve overall...
John R. Clymer
SAINT
2002
IEEE
15 years 2 months ago
Ubiquitous Commerce - Always On, Always Aware, Always Pro-active
The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill define...
Anatole Gershman