Sciweavers

9588 search results - page 1584 / 1918
» Service Value Networks
Sort
View
ICCSA
2005
Springer
15 years 10 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
MKM
2005
Springer
15 years 10 months ago
Computational Origami of a Morley's Triangle
Abstract. We present a computational origami construction of Morley’s triangles and automated proof of correctness of the generalized Morley’s theorem in a streamlined process ...
Tetsuo Ida, Hidekazu Takahashi, Mircea Marin
156
Voted
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
15 years 10 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
POLICY
2005
Springer
15 years 10 months ago
A Model for Usage Policy-Based Resource Allocation in Grids
Challenging usage policy issues can arise within virtual organizations (VOs) that integrate participants and resources spanning multiple physical institutions. Participants may wi...
Catalin Dumitrescu, Michael Wilde, Ian T. Foster
WAIM
2005
Springer
15 years 10 months ago
An Ontology-Based Host Resources Monitoring Approach in Grid Environment
Monitoring the real-time status of voluntary nodes is a basic task of Quality of Services (QoS) management in grid. The heterogeneity of distributed host resources is an obvious ob...
Yijiao Yu, Hai Jin
« Prev « First page 1584 / 1918 Last » Next »