Sciweavers

204 search results - page 26 / 41
» el 2006
Sort
View
IAJIT
2010
95views more  IAJIT 2010»
14 years 8 months ago
Modelling of Updating Moving Object Database Using Timed Petri Net Model
: Tracking moving objects is one of the most common requirements for many location-based applications. The location of a moving object changes continuously but the database locatio...
Hatem Abdul-Kader, Warda El-Kholy
PRL
2006
132views more  PRL 2006»
14 years 10 months ago
Modelling and accuracy estimation of a new omnidirectional depth computation sensor
Depth computation is an attractive feature in computer vision. The use of traditional perspective cameras for panoramic perception requires several images, most likely implying th...
Radu Orghidan, Joaquim Salvi, El Mustapha Mouaddib
104
Voted
IJIPT
2010
147views more  IJIPT 2010»
14 years 8 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
86
Voted
IJNSEC
2007
144views more  IJNSEC 2007»
14 years 10 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
100
Voted
JSAC
2006
131views more  JSAC 2006»
14 years 10 months ago
On Dynamic Optimization of Packet Matching in High-Speed Firewalls
Abstract--Packet matching plays a critical role in the performance of many network devices and a tremendous amount of research has already been invested to come up with better opti...
Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer