Sciweavers

2904 search results - page 355 / 581
» Internet Infrastructure Security
Sort
View
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 10 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
AIS
2004
Springer
15 years 10 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
AMAST
2004
Springer
15 years 10 months ago
Counting Votes with Formal Methods
This abstract provides some background information about the electronic voting experiment that is planned in the Netherlands for the European Elections of 2004, and about our own i...
Bart Jacobs
ISI
2004
Springer
15 years 9 months ago
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
Abstract. Information technologies and infectious disease informatics are playing an increasingly important role in preventing, detecting, and managing infectious disease outbreaks...
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Ca...
WORDS
2003
IEEE
15 years 9 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro