Sciweavers

1330 search results - page 253 / 266
» An interactive service customization model
Sort
View
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 2 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
INFOCOM
2007
IEEE
14 years 2 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
ICSOC
2007
Springer
14 years 1 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso
UM
2007
Springer
14 years 1 months ago
Capturing User Interests by Both Exploitation and Exploration
Personalization is one of the important research issues in the areas of information retrieval and Web search. Providing personalized services that are tailored toward the specific...
Ka Cheung Sia, Shenghuo Zhu, Yun Chi, Koji Hino, B...
ASIASIM
2004
Springer
14 years 1 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...