Sciweavers

197 search results - page 12 / 40
» A Survey of Trust in Internet Applications
Sort
View
AIS
2007
Springer
13 years 7 months ago
Unplanned effects of intelligent agents on Internet use: a social informatics approach
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Alexander Serenko, Umar Ruhi, Mihail Cocosila
GLOBECOM
2008
IEEE
14 years 1 months ago
MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet
— Naming and addressing are important issues for Next Generation Internet (NGI). In this paper, we discuss a new Mobility and Multihoming supporting Identifier Locator Split Arch...
Jianli Pan, Subharthi Paul, Raj Jain, Mic Bowman
SEMWEB
2004
Springer
14 years 26 days ago
Semantic Web Publishing using Named Graphs
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that descr...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
SEMWEB
2007
Springer
14 years 1 months ago
Ontology Mapping - a User Survey
Ontology mapping is the key to data interoperability in the semantic web vision. Computing mappings is the first step to applications such as query rewriting, instance sharing, we...
Sean M. Falconer, Natalya Fridman Noy, Margaret-An...
COMSUR
2007
101views more  COMSUR 2007»
13 years 7 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...