Sciweavers

4511 search results - page 485 / 903
» Observation Based System Security
Sort
View
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 11 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
ITNG
2008
IEEE
15 years 11 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
ER
2001
Springer
170views Database» more  ER 2001»
15 years 9 months ago
XDoC-WFMS: A Framework for Document Centric Workflow Management System
Document Management is an important component of a workflow management system. XML has become a prominent language for document processing and management, and has an additional adv...
Rupa Krishnan, Lalitha Munaga, Kamalakar Karlapale...
IPPS
1998
IEEE
15 years 9 months ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre
JCS
2008
69views more  JCS 2008»
15 years 5 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove