Sciweavers

512 search results - page 62 / 103
» A Motivation-Based Mechanism to Design Behaviors
Sort
View
APSCC
2008
IEEE
13 years 10 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
ICIS
2004
13 years 9 months ago
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to acces...
Heng Xu, Hock-Hai Teo
SIGCOMM
2010
ACM
13 years 8 months ago
Improving peer-to-peer file distribution: winner doesn't have to take all
Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading m...
Ben Leong, Youming Wang, Su Wen, Cristina Carbunar...
SCN
2008
Springer
131views Communications» more  SCN 2008»
13 years 8 months ago
CLL: A Cryptographic Link Layer for Local Area Networks
Abstract. Ethernet and IP form the basis of the vast majority of LAN installations. But these protocols do not provide comprehensive security mechanisms, and thus give way for a pl...
Yves Igor Jerschow, Christian Lochert, Björn ...
CCR
2004
84views more  CCR 2004»
13 years 7 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly