Sciweavers

15379 search results - page 101 / 3076
» Protecting users from
Sort
View
ICNP
2002
IEEE
15 years 2 months ago
An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II
— This paper describes a novel, ultra-fast heuristic algorithm to address an NP-hard optimization problem. One of its significances is that, for the first time, the paper shows...
Dahai Xu, Chunming Qiao, Yizhi Xiong
ECOOPW
1998
Springer
15 years 2 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
EATIS
2007
ACM
15 years 1 months ago
Protection of technological measures: juridical definition of a technical tool
The present work aims to bring to discussion and to analysis, the texts of the 6th article of the 2001/29/EC Directive (22nd of May) and the 217th article of the Portuguese law 50...
Lígia Lopes de Sousa Carreto
DICS
2006
15 years 1 months ago
Algorithms for Failure Protection in Large IP-over-fiber and Wireless Ad Hoc Networks
We address failure location and restoration in both optical and wireless ad hoc networks. First, we show how Maximum Likelihood inference can improve failure location algorithms in...
Frederick Ducatelle, Luca Maria Gambardella, Macie...
ACMSE
2008
ACM
15 years 14 hour ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling