Sciweavers

1801 search results - page 38 / 361
» Memory-Centric Security Architecture
Sort
View
ACSAC
1998
IEEE
15 years 6 months ago
An Architecture for Intrusion Detection Using Autonomous Agents
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
AGENTS
1998
Springer
15 years 6 months ago
A Market Architecture for Multi-Agent Contracting
We present a generalized market architecture that provides support for a variety of types of transactions, from simple buying and selling of goods and services to complex multi-age...
John Collins, Ben Youngdahl, Scott Jamison, Bamsha...
ITIIS
2008
91views more  ITIIS 2008»
15 years 1 months ago
Towards a Server-Centric Interaction Architecture for Wireless Applications
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...
FI
2011
96views more  FI 2011»
14 years 9 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
WICSA
2007
15 years 3 months ago
Assessing a Multi-Site Development Organization for Architectural Compliance
Multi-site development organizations require coordination and communication efforts between different sites to ensure successful distributed development. These efforts need to be ...
Viktor Clerc, Patricia Lago, Hans van Vliet