Sciweavers

2200 search results - page 353 / 440
» Hop Integrity in Computer Networks
Sort
View
RAID
2004
Springer
15 years 8 months ago
Fast Detection of Scanning Worm Infections
Worm detection and response systems must act quickly to identify and quarantine scanning worms, as when left unchecked such worms have been able to infect the majority of vulnerabl...
Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berge...
ISWC
2003
IEEE
15 years 8 months ago
Towards a design framework for wearable electronic textiles
This paper presents a design framework for wearable electronic textiles. The focus is on the design and simulation issues that arise from the interaction of the electronic textile...
Thomas Martin, Mark T. Jones, Joshua Edmison, Ravi...
DEBS
2003
ACM
15 years 8 months ago
Looking into the past: enhancing mobile publish/subscribe middleware
Publish/subscribe (pub/sub) middleware facilitates loosely coupled cooperation and fits well the needs of spontaneous, ad-hoc interaction. However, newly started mobile applicati...
Mariano Cilia, Ludger Fiege, C. Haul, Andreas Zeid...
MDM
2010
Springer
153views Communications» more  MDM 2010»
15 years 8 months ago
Dessy: Search and Synchronization on the Move
—Current smartphones have a storage capacity of several gigabytes. More and more information is stored on mobile devices. To meet the challenge of information organization, we tu...
Eemil Lagerspetz, Sasu Tarkoma, Tancred Lindholm
INAP
2001
Springer
15 years 7 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...