Sciweavers

630 search results - page 63 / 126
» Acceptable internet use policy
Sort
View
SAC
2008
ACM
13 years 7 months ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...
ICMCS
2010
IEEE
154views Multimedia» more  ICMCS 2010»
13 years 5 months ago
Minimizing delay in lossless sequential data streaming
There is an ongoing explosion of interactive Internet applications. By nature, these applications require responsive clientserver data exchange and lossless, in-order delivery. In...
Sanjeev Mehrotra, Jin Li, Ying-zong Huang
ECOWS
2007
Springer
14 years 1 months ago
Web Service Hosting and Revenue Maximization
An architecture of a hosting system is presented, where a number of servers are used to provide different types of web services to paying customers. There are charges for running ...
Michele Mazzucco, Isi Mitrani, Jennie Palmer, Mike...
SEMWEB
2005
Springer
14 years 1 months ago
On Partial Encryption of RDF-Graphs
In this paper a method for Partial RDF Encryption (PRE) is proposed in which sensitive data in an RDF-graph is encrypted for a set of recipients while all non-sensitive data remain...
Mark Giereth
IJEB
2006
73views more  IJEB 2006»
13 years 7 months ago
Broadband diffusion dynamics: a systemic analysis
: The paper analyses broadband diffusion from a multitude of angles. The main objective of the analysis is thus to investigate the reasons behind an adoption delay present in certa...
Enrico Ferro