Sciweavers

8770 search results - page 1486 / 1754
» Named Service Networking
Sort
View
ICDCSW
2003
IEEE
15 years 5 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
IEEEAMS
2003
IEEE
15 years 5 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
ITCC
2003
IEEE
15 years 5 months ago
Analysis and regeneration of hypermedia contents through Java and XML tools
This paper presents a tool, for the analysis and regeneration of web contents, implemented through XML and Java. At the moment, the web content delivery from server to clients is ...
David Mérida, Ramón Fabregat, Anna U...
IWIA
2003
IEEE
15 years 5 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
LCN
2003
IEEE
15 years 5 months ago
Measuring the Impact of Slow User Motion on Packet Loss and Delay over IEEE 802.11b Wireless Links
IEEE 802.11b compliant WLAN technology is increasingly used for cordless telephone services. Often, a WLAN phone is moved during a call. In the present paper we explore to what ex...
Christian Hoene, André Günther, Adam W...
« Prev « First page 1486 / 1754 Last » Next »