Sciweavers

2047 search results - page 131 / 410
» Pervasive Computing on Active Networks
Sort
View
IWMM
1992
Springer
100views Hardware» more  IWMM 1992»
15 years 3 months ago
Scalable Distributed Garbage Collection for Systems of Active Objects
Abstract. Automatic storage management is important in highly parallel programming environments where large numbers of objects and processes are being constantly created and discar...
Nalini Venkatasubramanian, Gul Agha, Carolyn L. Ta...
IEEEARES
2006
IEEE
15 years 5 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 4 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
DEXAW
1998
IEEE
165views Database» more  DEXAW 1998»
15 years 3 months ago
Event Processing in Mobile and Active Database Systems Using Broadcasts
The integration of active database technology into mobile database systems allows to limit the transfer of data between mobile computers and the stationary network. In order to em...
Stefan Sauer, Olaf Zukunft
POLICY
2007
Springer
15 years 5 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...