Sciweavers

8493 search results - page 1334 / 1699
» Implementing a distributed firewall
Sort
View
128
Voted
COOPIS
2003
IEEE
15 years 10 months ago
From Where to What: Metadata Sharing for Digital Photographs with Geographic Coordinates
Abstract. We describe LOCALE, a system that allows cooperating information systems to share labels for photographs. Participating photographs are enhanced with a geographic locatio...
Mor Naaman, Andreas Paepcke, Hector Garcia-Molina
125
Voted
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
15 years 10 months ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
DISCEX
2003
IEEE
15 years 10 months ago
Integrated Security Services for Dynamic Coalitions
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access permissions to coalition members based on negotiated r...
Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bo...
157
Voted
DSN
2003
IEEE
15 years 10 months ago
From Crash Tolerance to Authenticated Byzantine Tolerance: A Structured Approach, the Cost and Benefits
Many fault-tolerant group communication middleware systems have been implemented assuming crash failure semantics. While this assumption is not unreasonable, it becomes hard to ju...
Dimane Mpoeleng, Paul D. Ezhilchelvan, Neil A. Spe...
IAW
2003
IEEE
15 years 10 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
« Prev « First page 1334 / 1699 Last » Next »