Sciweavers

14824 search results - page 2733 / 2965
» Security - Introduction
Sort
View
JSAC
2006
111views more  JSAC 2006»
15 years 2 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
ENTCS
2007
113views more  ENTCS 2007»
15 years 2 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
139
Voted
JSAC
2006
137views more  JSAC 2006»
15 years 2 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
MTA
2008
93views more  MTA 2008»
15 years 2 months ago
Digital audiobook: from passive to active pursuit
The digital home entertainment market is growing at an exceptional speed and, although limited to passive listeners, audiobook applications are growing at an annual rate of nearly ...
Marco Furini
MMS
2006
15 years 2 months ago
Information assimilation framework for event detection in multimedia surveillance systems
Most multimedia surveillance and monitoring systems nowadays utilize multiple types of sensors to detect events of interest as and when they occur in the environment. However, due...
Pradeep K. Atrey, Mohan S. Kankanhalli, Ramesh Jai...
« Prev « First page 2733 / 2965 Last » Next »