Sciweavers

4305 search results - page 768 / 861
» Analysing Protocol Implementations
Sort
View
113
Voted
DAIS
2003
15 years 3 months ago
A Flexible Middleware Layer for User-to-User Messaging
Abstract. There is growing trend to unify user-to-user messaging systems to allow message exchange, independent of time, place, protocol, and end-user device. Building gateways to ...
Jan-Mark S. Wams, Maarten van Steen
ISTA
2004
15 years 3 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren
113
Voted
ISTA
2004
15 years 3 months ago
Evidential Paradigm and Intelligent Mathematical Text Processing
Abstract: This paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evid...
Alexander V. Lyaletski, Anatoly E. Doroshenko, And...
128
Voted
IC
2001
15 years 3 months ago
Trust-Based Facilitator for Agent-Based E-Commerce
- In this paper, we propose a facilitator which finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic ...
Chihiro Ono, Dai Kanemoto, Keesoo Kim, Boyd C. Pau...
117
Voted
FAST
2003
15 years 3 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...