Sciweavers

1748 search results - page 7 / 350
» Security Models for Heterogeneous Networking
Sort
View
JPDC
2007
86views more  JPDC 2007»
14 years 11 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
CN
2010
100views more  CN 2010»
14 years 11 months ago
A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba
ASIASIM
2004
Springer
15 years 5 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
GPC
2007
Springer
15 years 5 months ago
Heterogeneous Wireless Sensor Network Deployment and Topology Control Based on Irregular Sensor Model
Heterogeneous wireless sensor network (heterogeneous WSN) consists of sensor nodes with different ability, such as different computing power and sensing range. Compared with homoge...
Chun-Hsien Wu, Yeh-Ching Chung
IJNSEC
2007
144views more  IJNSEC 2007»
14 years 11 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh