Sciweavers

854 search results - page 97 / 171
» A Spatial Communication Model for Ubiquitous Computing Servi...
Sort
View
ISPEC
2007
Springer
14 years 3 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ECOWS
2006
Springer
14 years 16 days ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
SAC
2009
ACM
14 years 3 months ago
Using geo-spatial session tagging for smart multicast session discovery
IP multicast is increasingly seen as efficient mode of live content distribution in the Internet to significantly large subscriber bases. Despite its numerous benefits over IP u...
Piyush Harsh, Richard Newman
COORDINATION
2008
Springer
13 years 10 months ago
CiAN: A Workflow Engine for MANETs
Most mature workflow management systems (WfMSs) available today execute workflows via orchestration of an available set of services, a process in which a central coordinating enti...
Rohan Sen, Gruia-Catalin Roman, Christopher D. Gil...
CCS
2006
ACM
14 years 18 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch