Sciweavers

4143 search results - page 821 / 829
» Architecture of a Mobile Internet
Sort
View
CCS
2001
ACM
14 years 10 days ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
ICEIS
2000
IEEE
14 years 7 days ago
A Holistic Information Systems Strategy for Organisational Management-HISSOM
Alignment of organisational strategy with Information Systems Strategy (ISS) has become critical as adoption of Information Systems (IS) over the last 50 years has escalated. IS c...
David Lanc, Lachlan M. MacKinnon
SIGMETRICS
2000
ACM
177views Hardware» more  SIGMETRICS 2000»
14 years 6 days ago
A case for end system multicast
— The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal,...
Yang-Hua Chu, Sanjay G. Rao, Hui Zhang
ECAI
2000
Springer
14 years 5 days ago
Flexible Text Classification for Financial Applications: The Facile System
This paper describes an advanced system for multilingual text classification adaptable to different user needs. The system has been initially developed as an applied research proje...
Fabio Ciravegna, Alberto Lavelli, Nadia Mana, Joha...
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
14 years 5 days ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu