Sciweavers

7683 search results - page 1279 / 1537
» Distributed Computing with the CLAN Network
Sort
View
HOTI
2005
IEEE
15 years 10 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
QSHINE
2005
IEEE
15 years 10 months ago
Enhancing the IEEE 802.11e in QoS Support: Analysis and Mechanisms
Despite its support of prioritized services, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) cannot guarantee strict QoS required by real-time services such as voice a...
Xiang Chen, Hongqiang Zhai, Yuguang Fang
HPCC
2005
Springer
15 years 10 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
ICIC
2005
Springer
15 years 10 months ago
Sequential Stratified Sampling Belief Propagation for Multiple Targets Tracking
Rather than the difficulties of highly non-linear and non-Gaussian observation process and the state distribution in single target tracking, the presence of a large, varying number...
Jianru Xue, Nanning Zheng, Xiaopin Zhong
ISPA
2005
Springer
15 years 10 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
« Prev « First page 1279 / 1537 Last » Next »