Sciweavers

483 search results - page 45 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
125
Voted
JCP
2007
86views more  JCP 2007»
15 years 3 months ago
Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property
— Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method f...
Mohammad Shirali-Shahreza
135
Voted
IPC
2007
IEEE
15 years 9 months ago
Intelligent Search Mechanism Based on Neuro-Fuzzy System for the Distributed Object Groups
Current research in distributed systems focuses on object group models which are designed for scalable systems and provide accessible objects to the entire group. However, dynamic...
Romeo Mark A. Mateo, Bobby D. Gerardo, Jaewan Lee
158
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
139
Voted
ICIW
2008
IEEE
15 years 10 months ago
Evaluating the Use of AOP and MDA in Web Service Development
— Model-Driven Architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other...
Guadalupe Ortiz, Behzad Bordbar, Juan Herná...
TEC
2002
166views more  TEC 2002»
15 years 3 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...