Sciweavers

1449 search results - page 250 / 290
» Secure and Efficient Metering
Sort
View
ISI
2003
Springer
15 years 5 months ago
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, F...
NOMS
2002
IEEE
131views Communications» more  NOMS 2002»
15 years 4 months ago
Tools for domain-based policy management of distributed systems
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
HAIS
2010
Springer
15 years 4 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
15 years 4 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 3 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...