Sciweavers

2509 search results - page 455 / 502
» Abstract Geometrical Computation and Computable Analysis
Sort
View
MIDDLEWARE
2004
Springer
14 years 3 months ago
Alternative Edge-Server Architectures for Enterprise JavaBeans Applications
Abstract. Edge-server architectures are widely used to improve webapplication performance for non-transactional data. However, their use with transactional data is complicated by t...
Avraham Leff, James T. Rayfield
WISA
2004
Springer
14 years 3 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafï...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
EDOC
2003
IEEE
14 years 3 months ago
MQL: a Powerful Extension to OCL for MOF Queries
The Meta-Object Facility (MOF) provides a standardised framework for object-oriented models. An instance of a MOF model contains objects and links whose interfaces are entirely de...
David Hearnden, Kerry Raymond, Jim Steel
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
LCN
2003
IEEE
14 years 3 months ago
Regional Gossip Routing for Wireless Ad Hoc Networks
Abstract—Many routing protocols have been proposed for wireless ad hoc networks, and most of them are based on some variants of flooding. Thus many routing messages are propagat...
Xiang-Yang Li, Kousha Moaveninejad, Ophir Frieder