Sciweavers

630 search results - page 59 / 126
» Acceptable internet use policy
Sort
View
CCR
2006
116views more  CCR 2006»
13 years 7 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 29 days ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
LCN
2006
IEEE
14 years 1 months ago
Ethernet Adaptive Link Rate: System Design and Performance Evaluation
The Internet and the devices that connect to it consume a growing and significant amount of electricity. The utilization of desktop to switch Ethernet links is generally very low ...
Chamara Gunaratne, Kenneth J. Christensen
ICWS
2007
IEEE
13 years 9 months ago
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture
Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and req...
Stephen S. Yau, Junwei Liu
ISSA
2004
13 years 9 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li