Sciweavers

113 search results - page 6 / 23
» Offshore information systems outsourcing: strategies and sce...
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
IEICET
2008
136views more  IEICET 2008»
14 years 9 months ago
Delay Analysis of Car-to-Car Reliable Data Delivery Strategies Based on Data Mulling with Network Coding
Abstract--Vehicular ad hoc networks (VANET) aims to enhance vehicle navigation safety by providing an early warning system: any chance of accidents is informed through the wireless...
Joon-Sang Park, Uichin Lee, Soon-Young Oh, Mario G...
CISS
2007
IEEE
15 years 4 months ago
Routing Strategies in Broadband Multihop Cooperative Networks
— Two fundamental properties of wireless networks, the variable link quality and the broadcast nature of the transmission, have often been ignored in the design of routing protoc...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.
INTERACT
2003
14 years 11 months ago
VisMeB: A Visual Metadata Browser
: The video-paper describes a java prototype of a generic visual information retrieval system called VisMeB, developed to visualize metadata within various contexts. We reconsidere...
Tobias Limbach, Harald Reiterer, Peter Klein, Fran...
POLICY
2005
Springer
15 years 3 months ago
A RBAC-Based Policy Information Base
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...
Timothy E. Squair, Edgard Jamhour, Ricardo Nabhen