Sciweavers

1737 search results - page 155 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
IEEEARES
2008
IEEE
15 years 11 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
ATAL
2005
Springer
15 years 10 months ago
Sequential auctions for objects with common and private values
Sequential auctions are an important mechanism for buying/selling multiple objects. Existing work has studied sequential auctions for objects that are exclusively either common va...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
IJIPT
2007
91views more  IJIPT 2007»
15 years 4 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins
ICICS
2005
Springer
15 years 10 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
GEOINFORMATICA
2007
223views more  GEOINFORMATICA 2007»
15 years 4 months ago
Algorithms for Nearest Neighbor Search on Moving Object Trajectories
Nearest Neighbor (NN) search has been in the core of spatial and spatiotemporal database research during the last decade. The literature on NN query processing algorithms so far d...
Elias Frentzos, Kostas Gratsias, Nikos Pelekis, Ya...