Sciweavers

510 search results - page 73 / 102
» Traffic Flow Management Modeling and Operational Complexity
Sort
View
IJNM
2000
91views more  IJNM 2000»
14 years 9 months ago
Coding-based schemes for fault identification in communication networks
The complexity of communication networks and the amount of information transferred in these networks have made the management of such networks increasingly difficult. Since faults ...
Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin
CMS
2003
171views Communications» more  CMS 2003»
14 years 11 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
TISSEC
2010
142views more  TISSEC 2010»
14 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
ICETE
2004
204views Business» more  ICETE 2004»
14 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
CONTEXT
2003
Springer
15 years 3 months ago
GRAVA: An Architecture Supporting Automatic Context Transitions and Its Application to Robust Computer Vision
We describe a software development approach for vision that enhances robustness by making novel use of context. Conventional approaches to most image understanding problems suffe...
Paul Robertson, Robert Laddaga