Sciweavers

8770 search results - page 1483 / 1754
» Named Service Networking
Sort
View
EGC
2005
Springer
15 years 5 months ago
Towards a Grid-wide Intrusion Detection System
We describe SANTA-G (Grid-enabled System Area Networks Trace Analysis), an instrument monitoring framework that uses the RGMA (Relational Grid Monitoring Architecture). We describe...
Stuart Kenny, Brian A. Coghlan
EUC
2005
Springer
15 years 5 months ago
Ubiquitous Computing: Challenges in Flexible Data Aggregation
Abstract. A dramatic increase of event monitoring capabilities by wireless sensors requires new, more sophisticated, event correlation over time and space. This new paradigm implie...
Eiko Yoneki, Jean Bacon
ICCSA
2005
Springer
15 years 5 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
MKM
2005
Springer
15 years 5 months ago
Computational Origami of a Morley's Triangle
Abstract. We present a computational origami construction of Morley’s triangles and automated proof of correctness of the generalized Morley’s theorem in a streamlined process ...
Tetsuo Ida, Hidekazu Takahashi, Mircea Marin
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
15 years 5 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
« Prev « First page 1483 / 1754 Last » Next »