Zobrazeno 1 - 10
of 19
pro vyhledávání: '"C. T. Stockel"'
Publikováno v:
Computer Communications. 20:521-527
Many large scale core data networks are now based on the new generation of intelligent time division multiplexers. These allow permanent virtual circuits between any network nodes and automatic rerouting of lost connections should link failures occur
Publikováno v:
Expert Systems. 13:296-304
This paper presents a model for increasing security within a security domain through the use of localised security services and continuous monitoring. The model divides security services between three logical structures Local Security Units, Local Se
Publikováno v:
Computer Communications. 19:564-570
Many large data communication systems can be conveniently divided into core and customer access network arrangements. The design of the latter, with statistical multiplexers and leased line or dial-up access, is often neglected in terms of optimum ar
Publikováno v:
Scopus-Elsevier
Information security is now recognized as an important consideration in modern healthcare establishments (HCEs), with a variety of guidelines and standards currently available to enable the environments to be properly protected. However, financial an
Publikováno v:
Cryptologia. 17:264-282
Although of similar age, the Quadratic Residue Cipher (QRC) has been neglected compared with the publicity received by other public key cryptosystems, notably the RSA cipher. This paper attempts to redress the balance somewhat, explaining in exposito
Publikováno v:
Information Systems Security ISBN: 9781504129213
SEC
SEC
This paper examines the use of keystroke analysis as a means of improving authentication in modem information systems, based upon the biometric measurement of user typing characteristics. The discussion identifies that the concept may be implemented
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ce8d0e55b0a77a8855a9ee8e981223c4
https://doi.org/10.1007/978-1-5041-2919-0_25
https://doi.org/10.1007/978-1-5041-2919-0_25
Publikováno v:
Journal of Navigation. 39:180-190
There can be little doubt that the overall standards of safety at sea are high, particularly with the traditional maritime nations. Cockcroft states that of a total of 22600 ships over 1000 g.r.t trading in 1979, 9400 were from the traditional mariti
Publikováno v:
Computer Communications. 10:30-38
There are a number of techniques that enable networks to be optimized. Neither search techniques nor heuristic methods are entirely satisfactory in solving practical problems. The authors describe an approach to network optimization that utilizes an
Publikováno v:
Journal of Navigation. 35:347-352
In a previous paper a model was outlined for an encounter between two vessels. This paper shows how the model has been developed to include the simulation of the behaviour of more than two ships, the entrance to harbours, and narrow channels.In a pre
Publikováno v:
Journal of Navigation. 36:324-328
Two main concepts in mathematical modelling of ship encounters have been proposed by Davis. The first, the ‘domain’, was an adaptation of a concept originally introduced by Goodwin, who defined the domain as the ‘area about own-ship that a navi