Sciweavers

4143 search results - page 763 / 829
» Architecture of a Mobile Internet
Sort
View
JNW
2006
142views more  JNW 2006»
13 years 9 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
IS
2007
13 years 9 months ago
Browsing large online data tables using generalized query previews
Companies, government agencies, and other organizations are making their data available to the world over the Internet. They often use large online relational tables for this purp...
Egemen Tanin, Ben Shneiderman, Hairuo Xie
JSAC
2007
95views more  JSAC 2007»
13 years 9 months ago
Experiences in implementing an experimental wide-area GMPLS network
In this article, we describe our experiences in implementing an experimental wide-area GMPLS network called CHEETAH (Circuit-Switched End-to-End Transport Architecture). The key c...
Xiangfei Zhu, Xuan Zheng, Malathi Veeraraghavan
CSSE
2004
IEEE
13 years 9 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
COMCOM
2002
120views more  COMCOM 2002»
13 years 9 months ago
An interactive video delivery and caching system using video summarization
With the advance of high-speed network technologies, the availability and popularity of streaming media content over the Internet has grown rapidly in recent years. The delivery a...
Sung-Ju Lee, Wei-Ying Ma, Bo Shen