Sciweavers

948 search results - page 90 / 190
» Making a Game of Network Security
Sort
View
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 2 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
ISI
2008
Springer
14 years 10 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
POLICY
2001
Springer
15 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
PROMS
2001
Springer
110views Multimedia» more  PROMS 2001»
15 years 2 months ago
On the End-User QoS-Awareness of a Distributed Service Environment
A lot of attention has been given to network quality of service and efforts to make layers on top of the network also QoS-aware increase noticeably. This paper explores QoS-aware s...
Ing Widya, R. E. Stap, L. J. Teunissen, B. Frank H...
CGI
1999
IEEE
15 years 2 months ago
Time Warping of Audio Signals
This paper describes a technique to obtain a time dilation or contraction of an audio signal. Different Computer Graphics applications can take advantage of this technique. In rea...
Siome Goldenstein, Jonas Gomes