Sciweavers

20638 search results - page 3914 / 4128
» Network Computing
Sort
View
116
Voted
CSREASAM
2008
15 years 4 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
142
Voted
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 4 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
145
Voted
DMS
2008
106views Multimedia» more  DMS 2008»
15 years 4 months ago
A Multimedia Data Streams Model for Content-based Information Retrieval
: Multimedia applications nowadays are becoming the standard, for they utilize the enormous human brain computational power. In the past, the Relational Database Model was generali...
Shenoda Guirguis, Rohit Kulkarni, Shi-Kuo Chang
113
Voted
FORTE
2007
15 years 4 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
129
Voted
IADIS
2008
15 years 4 months ago
A Case-Based Reasoning System to Forecast the Presence Of Oil Slicks
After an oil spill it is essential to know if an area is going to be affected by the oil slicks generated. The system presented here forecasts the presence or not of oil slicks in...
Juan M. Corchado, Aitor Mata, Juan Francisco de Pa...
« Prev « First page 3914 / 4128 Last » Next »