Sciweavers

459 search results - page 79 / 92
» Malware Models for Network and Service Management
Sort
View
78
Voted
ACSAC
2006
IEEE
15 years 1 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
MONET
2010
114views more  MONET 2010»
14 years 7 months ago
Integration of 3G Connectivity in PlanetLab Europe
Distributed research testbeds play a fundamental role in the evaluation of disruptive innovations for the Future Internet. In recent years, the main research funding agencies have ...
Alessio Botta, Roberto Canonico, Giovanni Di Stasi...
CISS
2008
IEEE
15 years 3 months ago
Resource and power costs in dynamic spectrum allocation
— We consider a network setting, where a single Service Provider (SP) provides wireless data services to a group of users in the downlink. The transmission model is similar to OF...
Joydeep Acharya, Roy D. Yates
ISPDC
2005
IEEE
15 years 3 months ago
Adaptive window scheduling for a hierarchical agent system
DIET (Distributed Interactive Engineering Toolbox) is a toolbox for the construction of Network Enabled Server (NES) systems. For most NES systems, as for most grid middleware sys...
Holly Dail, Frederic Desprez
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
15 years 4 months ago
Building Leadership for Life Cycle Business Transition by Hybrid Innovation
Manufacturing companies that are expanding their product offering to cover also lifecycle services in the customers’ facilities are facing the increasing complexity and risk to ...
Vesa Salminen