• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,956
Next 10 →

Security provision in

by Southern Lebanon , 2010
"... Surveying public opinion In July 2006, following a series of crossborder incursions by Hezbollah into Israeli territory and the capture of two Israeli Defence Forces (IDF) personnel, Israel initiated a 24-day bombing campaign in Southern Lebanon. 1 During the campaign, Israel fired more than 100,000 ..."
Abstract - Add to MetaCart
and individuals in Southern Lebanon? Quantitative and qualitative research on arms, armed groups, and security provision in Southern Lebanon is extremely limited. Local sensitivities Amal militants take cover and trade fire with government-aligned Sunni forces during the opposition‘s siege of Beirut in May 2008

Simulation for Security Provision, Attack Assessment and

by Profiling For Distributed, Richard N. Zobel , 2002
"... Security provision for protection when employing simulators over the Internet, becomes daily more important for protection of data and operations. This paper identifies the two major activities of registration and message (data) passing. Encryption and decryption are discussed along the issues assoc ..."
Abstract - Add to MetaCart
Security provision for protection when employing simulators over the Internet, becomes daily more important for protection of data and operations. This paper identifies the two major activities of registration and message (data) passing. Encryption and decryption are discussed along the issues

Secure Routing for Mobile Ad Hoc Networks

by Panagiotis Papadimitratos, Zygmunt Haas - MOBILE COMPUTING AND COMMUNICATIONS REVIEW , 2002
"... For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of secu- rity cannot be underrated. The provision of comprehen- sive secure communication mandates that both route dis- covery and dat ..."
Abstract - Cited by 599 (14 self) - Add to MetaCart
For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of secu- rity cannot be underrated. The provision of comprehen- sive secure communication mandates that both route dis- covery

Search, Self-Insurance and Job-Security Provisions

by Fernando Alvarez, Marcelo Veracierto , 1998
"... We construct a general equilibrium model to evaluate the quantitative e¤ects of severance payments in the presence of contracting and reallocational frictions. Key elements of the model are: 1) establishment level dynamics, 3) imperfect insurance markets, and 4) variable search decisions. Contrary ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We construct a general equilibrium model to evaluate the quantitative e¤ects of severance payments in the presence of contracting and reallocational frictions. Key elements of the model are: 1) establishment level dynamics, 3) imperfect insurance markets, and 4) variable search decisions. Contrary to previous studies that analyzed severance payments in frictionless environments, we …nd that severance payments reduce unemployment, produce negative insurance e¤ects and improve welfare levels.

1www.lebanon-violence.org Security provision in

by Southern Lebanon, Paign In Southern Lebanon. During , 2010
"... border incursions by Hezbollah into Israeli territory and the capture of two Israeli Defence Forces (IDF) personnel, Israel initiated a 24-day bombing cam- ..."
Abstract - Add to MetaCart
border incursions by Hezbollah into Israeli territory and the capture of two Israeli Defence Forces (IDF) personnel, Israel initiated a 24-day bombing cam-

Xen and the art of virtualization

by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield - IN SOSP , 2003
"... Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security or fun ..."
Abstract - Cited by 2010 (35 self) - Add to MetaCart
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security

Resource-aware self-adaptive security provisioning in mobile ad hoc networks

by Chunxiao Chigan , Leiyuan Li , Yinghua Ye - Wireless Communications and Networking Conference, 2005 IEEE , 2005
"... Abstract-Providing satisfactory security services in Mobile Ad Hoc Network (MANET) is indispensable to their mission critical applications; however, often a highly secure mechanism inevitably consumes a rather large amount of system resources, which in turn may unintentionally cause a security prov ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
provisioning Denial of Service (SPDoS) attack. To avoid SPDoS attack, this paper sets out a framework to design a resource-aware self-adaptive network security provisioning scheme for the resource constraint MANET. With the support of the offline optimal secure protocol selection module and the online self

Security Provisioning in Pervasive Environments Using Multi-objective Optimization

by Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley
"... Abstract. Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, effective security mechanisms can be quite different from those typically deployed in conventional applications ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
the residual damage and the cost of security provisioning. We propose the use of workflow profiles to capture the contexts in which a communication channel is used in a pervasive environment. This is used to minimize the cost that the underlying business entity will have to incur in order to keep the workflow

Secure Provision of Reactive Power Ancillary Services in Competitive Electricity Markets

by Ismael El-samahy
"... ©Ismael El-Samahy, 2008I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. The research work presented in thi ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive

Safety technologies impacts survey in M-services security provision 1

by Fatemeh Nassereslami, Fatemeh Saghafi
"... Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools to a remote control, transfer messages and financial transactions tools. One of the most important challenges in the m- se ..."
Abstract - Add to MetaCart
- services area is the security issue. Different papers have discussed various aspects of secured networks. But, until now a extensive ranking approach has not been presented to overcome the security issues. In this paper, first the security technologies and their applications have reviewed. Then the future
Next 10 →
Results 1 - 10 of 2,956
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University