Sciweavers

2281 search results - page 263 / 457
» Security Patterns and Secure Systems Design
Sort
View
122
Voted
AGENTS
1997
Springer
15 years 7 months ago
Transportable Information Agents
Transportable agents are autonomous programs. They can move through a heterogeneous network of computers under their own control, migrating from host to host. They can sense the s...
Daniela Rus, Robert S. Gray, David Kotz
149
Voted
SNPD
2007
15 years 5 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...
142
Voted
WMI
2001
147views more  WMI 2001»
15 years 5 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
113
Voted
CCR
2007
168views more  CCR 2007»
15 years 3 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
171
Voted
JNW
2008
118views more  JNW 2008»
15 years 2 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo