Sciweavers

8493 search results - page 1398 / 1699
» Implementing a distributed firewall
Sort
View
DSS
2006
132views more  DSS 2006»
15 years 4 months ago
Agents with shared mental models for enhancing team decision makings
Proactive information sharing is a challenging issue faced by intelligence agencies in effectively making critical decisions under time pressure in areas related to homeland secur...
John Yen, Xiaocong Fan, Shuang Sun, Timothy Hanrat...
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 4 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
IJSNET
2008
126views more  IJSNET 2008»
15 years 4 months ago
Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks
: Interference from colocated networks operating over the same frequency range, becomes an increasingly severe problem as the number of networks overlapping geographically increase...
Razvan Musaloiu-Elefteri, Andreas Terzis
IJWIN
2008
126views more  IJWIN 2008»
15 years 4 months ago
IEEE 802.11 Load Balancing: An Approach for QoS Enhancement
Abstract. With the 802.11 WLAN multimedia applications (Video, Audio, realtime voice over IP,...) increasing, providing Quality of Service (QoS) support becomes very important sinc...
Issam Jabri, Nicolas Krommenacker, Thierry Divoux,...
CN
2007
90views more  CN 2007»
15 years 4 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
« Prev « First page 1398 / 1699 Last » Next »