Sciweavers

8493 search results - page 1407 / 1699
» Implementing a distributed firewall
Sort
View
144
Voted
TSE
2008
115views more  TSE 2008»
15 years 4 months ago
Do Crosscutting Concerns Cause Defects?
There is a growing consensus that crosscutting concerns harm code quality. An example of a crosscutting concern is a functional requirement whose implementation is distributed acro...
Marc Eaddy, Thomas Zimmermann, Kaitin D. Sherwood,...
JNCA
2007
75views more  JNCA 2007»
15 years 4 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du
ADHOC
2004
100views more  ADHOC 2004»
15 years 4 months ago
Position and orientation in ad hoc networks
Position and orientation information of individual nodes in ad hoc networks is useful for both service and application implementation. Services that can be enabled by availability...
Dragos Niculescu, Badri Nath
167
Voted
AMAI
2004
Springer
15 years 4 months ago
Rapid Prototyping of Large Multi-Agent Systems Through Logic Programming
Prototyping is a valuable technique to help software engineers explore the design space while gaining insight on the dynamics of the system. In this paper, we describe a method for...
Wamberto Weber Vasconcelos, David Stuart Robertson...
TWC
2008
156views more  TWC 2008»
15 years 4 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
« Prev « First page 1407 / 1699 Last » Next »