Sciweavers

7300 search results - page 1377 / 1460
» Multi-modal network protocols
Sort
View
122
Voted
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 10 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
PET
2004
Springer
15 years 10 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
115
Voted
WISA
2004
Springer
15 years 10 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafï...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
WWIC
2004
Springer
124views Communications» more  WWIC 2004»
15 years 10 months ago
Mobility-Aware Rendezvous Point for Mobile Multicast Sources
: Current multicast routing protocols have not been designed for mobile nodes and especially roaming sources. Using the remote subscription as basis, we develop a new approach base...
Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdel...
HICSS
2003
IEEE
147views Biometrics» more  HICSS 2003»
15 years 10 months ago
Balancing Energy Saving and QoS in the Mobile Internet: An Application-Independent Approach
The scarcity of energetic resources in mobile computers is a very limiting factor. In this paper we propose a solution that tries to balance energy consumption and QoS requirement...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
« Prev « First page 1377 / 1460 Last » Next »