Sciweavers

14824 search results - page 2623 / 2965
» Security - Introduction
Sort
View
131
Voted
EXTREME
2003
ACM
15 years 8 months ago
Can Topic Maps describe context for enterprise-wide applications?
Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information th...
Duane Degler, Lisa Battle
SASN
2003
ACM
15 years 8 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
125
Voted
SENSYS
2003
ACM
15 years 8 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
135
Voted
SIGCOMM
2003
ACM
15 years 8 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
98
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Liberating lab computing: building a stable yet flexible computing environment for students and faculty
Indiana State University has found a way in its 25+ computing facilities to combine the need for a central stable lab image and small support staff with the academic needs of flex...
Kenneth Janz, Pei-Yi Hu
« Prev « First page 2623 / 2965 Last » Next »