International Conference on Autonomic and Trusted Computing最新文献

筛选
英文 中文
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching 基于TCP/IP包交叉匹配的入侵检测与规避
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_2
Jianhua Yang, Byong Lee
{"title":"Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching","authors":"Jianhua Yang, Byong Lee","doi":"10.1007/978-3-540-69295-9_2","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_2","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks 基于灰关联分析的无线自组网加权路由协议
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_52
Hung-Chi Chu, Yi-Ting Hsu, Yong-Hsun Lai
{"title":"A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks","authors":"Hung-Chi Chu, Yi-Ting Hsu, Yong-Hsun Lai","doi":"10.1007/978-3-540-69295-9_52","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_52","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Automated Planning for Trusted Self-organising Organic Computing Systems 基于自动化规划的可信自组织有机计算系统
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_7
B. Satzger, A. Pietzowski, W. Trumler, T. Ungerer
{"title":"Using Automated Planning for Trusted Self-organising Organic Computing Systems","authors":"B. Satzger, A. Pietzowski, W. Trumler, T. Ungerer","doi":"10.1007/978-3-540-69295-9_7","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_7","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114663829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Web Search Results Clustering Based on a Novel Suffix Tree Structure 基于新型后缀树结构的网络搜索结果聚类
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_43
Junze Wang, Yijun Mo, Benxiong Huang, Jie Wen, Li He
{"title":"Web Search Results Clustering Based on a Novel Suffix Tree Structure","authors":"Junze Wang, Yijun Mo, Benxiong Huang, Jie Wen, Li He","doi":"10.1007/978-3-540-69295-9_43","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_43","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124417344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots 基于人工免疫系统的容错机器人异常检测引擎
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_16
Bojan Jakimovski, E. Maehle
{"title":"Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots","authors":"Bojan Jakimovski, E. Maehle","doi":"10.1007/978-3-540-69295-9_16","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_16","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Annotation Markers for Runtime Replication Protocol Selection 运行时复制协议选择的注释标记
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_39
H. Meling
{"title":"Annotation Markers for Runtime Replication Protocol Selection","authors":"H. Meling","doi":"10.1007/978-3-540-69295-9_39","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_39","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129345748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Operating System Architecture for Organic Computing in Embedded Real-Time Systems 嵌入式实时系统中有机计算的操作系统架构
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_28
Florian Kluge, Jörg Mische, S. Uhrig, T. Ungerer
{"title":"An Operating System Architecture for Organic Computing in Embedded Real-Time Systems","authors":"Florian Kluge, Jörg Mische, S. Uhrig, T. Ungerer","doi":"10.1007/978-3-540-69295-9_28","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_28","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks SEMAP:基于攻击点的Ad Hoc网络多路径安全性改进
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_13
Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong
{"title":"SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks","authors":"Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong","doi":"10.1007/978-3-540-69295-9_13","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_13","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of Information Security Practice in a Critical Infrastructure Application 关键基础设施应用中的信息安全实践研究
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_42
M. Jaatun, E. Albrechtsen, M. B. Line, S. Johnsen, I. Wærø, O. Longva, Inger Anne Tøndel
{"title":"A Study of Information Security Practice in a Critical Infrastructure Application","authors":"M. Jaatun, E. Albrechtsen, M. B. Line, S. Johnsen, I. Wærø, O. Longva, Inger Anne Tøndel","doi":"10.1007/978-3-540-69295-9_42","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_42","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132779567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network 利用多检测器检测无线Mesh网络中自利节点退避时间
International Conference on Autonomic and Trusted Computing Pub Date : 2008-06-23 DOI: 10.1007/978-3-540-69295-9_23
Furong Wang, Yipeng Qu, B. Bai, Fan Zhang, Chen Huang
{"title":"Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network","authors":"Furong Wang, Yipeng Qu, B. Bai, Fan Zhang, Chen Huang","doi":"10.1007/978-3-540-69295-9_23","DOIUrl":"https://doi.org/10.1007/978-3-540-69295-9_23","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116253375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信