Sciweavers

4263 search results - page 600 / 853
» Network Security
Sort
View
155
Voted
COMCOM
2006
154views more  COMCOM 2006»
15 years 4 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
JSAC
2007
95views more  JSAC 2007»
15 years 4 months ago
Experiences in implementing an experimental wide-area GMPLS network
In this article, we describe our experiences in implementing an experimental wide-area GMPLS network called CHEETAH (Circuit-Switched End-to-End Transport Architecture). The key c...
Xiangfei Zhu, Xuan Zheng, Malathi Veeraraghavan
CN
1999
93views more  CN 1999»
15 years 4 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
FI
2010
143views more  FI 2010»
14 years 11 months ago
Implementing Value Added Applications in Next Generation Networks
: One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telec...
Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou, Yuan-Kua...
158
Voted
CSE
2009
IEEE
15 years 11 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi