Sciweavers

8493 search results - page 1597 / 1699
» Implementing a distributed firewall
Sort
View
136
Voted
MOBIWAC
2006
ACM
15 years 9 months ago
A totally decentralized document sharing system for mobile ad hoc networks
Many research projects have defined applications that are claimed to operate in a MANet environment. Consider for instance these software tools that make it possible to share inf...
Lionel Barrère, Arnaud Casteigts, Serge Cha...
136
Voted
MSR
2006
ACM
15 years 9 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
123
Voted
NETGAMES
2006
ACM
15 years 9 months ago
Applying database replication to multi-player online games
Multi-player Online Games (MOGs) have emerged as popular data intensive applications in recent years. Being used by many players simultaneously, they require a high degree of faul...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
151
Voted
SACMAT
2006
ACM
15 years 9 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
150
Voted
SASN
2006
ACM
15 years 9 months ago
RANBAR: RANSAC-based resilient aggregation in sensor networks
We present a novel outlier elimination technique designed for sensor networks. This technique is called RANBAR and it is based on the RANSAC (RANdom SAmple Consensus) paradigm, wh...
Levente Buttyán, Péter Schaffer, Ist...
« Prev « First page 1597 / 1699 Last » Next »