Sciweavers

1748 search results - page 210 / 350
» Security Models for Heterogeneous Networking
Sort
View
ICCD
2000
IEEE
106views Hardware» more  ICCD 2000»
15 years 8 months ago
Fast Subword Permutation Instructions Using Omega and Flip Network Stages
This paper proposes a new way of efficiently doing arbitrary ¢ -bit permutations in programmable processors modeled on the theory of omega and flip networks. The new omflip ins...
Xiao Yang, Ruby B. Lee
IAT
2007
IEEE
15 years 7 months ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 5 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
IEEEARES
2008
IEEE
15 years 10 months ago
Reliability Analysis using Graphical Duration Models
Reliability analysis has become an integral part of system design and operating. This is especially true for systems performing critical tasks such as mass transportation systems....
Roland Donat, Laurent Bouillaut, Patrice Aknin, Ph...
153
Voted
AH
2008
Springer
15 years 10 months ago
A Dynamic Content Generator for Adaptation in Hypermedia Systems
The heterogeneity problem (in terms of different types of access devices, network bandwidth, preferences/characteristics of the user, etc.) has become a major problem for the Inter...
David Mérida, Ramón Fabregat, Xavier...