Sciweavers

3031 search results - page 299 / 607
» SNMS - Shadow Network Management System
Sort
View
ISCI
2007
152views more  ISCI 2007»
15 years 4 months ago
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes
Digital video recorder (DVR) systems are novel security products with significant potential for application in the surveillance market, which, like many other areas of security t...
Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lu...
CCS
2004
ACM
15 years 10 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
DBSEC
2007
128views Database» more  DBSEC 2007»
15 years 6 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
CISS
2008
IEEE
15 years 11 months ago
Quickest spectrum sensing in cognitive radio
Abstract— Quickest detection is applied to frequency spectrum sensing in cognitive radio systems. Distribution change in frequency domain is detected for vacating secondary radio...
Husheng Li, Chengzhi Li, Huaiyu Dai
123
Voted
STANDARDVIEW
1998
128views more  STANDARDVIEW 1998»
15 years 4 months ago
Compatibility, standards, and software production
Compatibility is a key strategic decision in software production. Proposals exist for standards in several fields of software production, such as networking (ISO and IEEE), operat...
Giancarlo Succi, Andrea Valerio, Tullio Vernazza, ...