Sciweavers

2281 search results - page 339 / 457
» Security Patterns and Secure Systems Design
Sort
View
133
Voted
WIOPT
2010
IEEE
15 years 1 months ago
Saluki: A high-performance Wi-Fi sniffing program
Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sni...
Keren Tan, David Kotz
TDSC
2011
14 years 11 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
MOC
2010
14 years 10 months ago
Entropy-satisfying relaxation method with large time-steps for Euler IBVPs
This paper could have been given the title: "How to positively and implicitly solve Euler equations using only linear scalar advections." The new relaxation method we pr...
Frédéric Coquel, Quang Long Nguyen, ...
ECOOP
2012
Springer
13 years 6 months ago
Enhancing JavaScript with Transactions
Abstract. Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted g...
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
118
Voted
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
15 years 10 months ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat