Sciweavers

828 search results - page 131 / 166
» Access Control in Location-Based Services
Sort
View
NCA
2005
IEEE
14 years 2 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan
CBSE
2005
Springer
14 years 2 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
SDMW
2005
Springer
14 years 2 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
14 years 1 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
FSR
2003
Springer
89views Robotics» more  FSR 2003»
14 years 1 months ago
An Enhanced Robotic Library System for an Off-Site Shelving Facility
This paper describes our continued work of a unique robotics project, Comprehensive Access to Printed Materials (CAPM), within the context of libraries. As libraries provide a gro...
Jackrit Suthakorn, Sangyoon Lee, Yu Zhou, G. Sayee...