Sciweavers

1591 search results - page 289 / 319
» Associating network flows with user and application informat...
Sort
View
IPPS
2007
IEEE
14 years 1 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
AINA
2004
IEEE
13 years 11 months ago
Balancing Workload based on Content Types for Scalable Web Server Clusters
With the rapid growth of information stored in worldwide web servers, searching and capturing data on Internet become a common behavior for us. In order to increase the availabili...
Tzung-Shi Chen, Kuo-Lian Chen
RAID
2007
Springer
14 years 1 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ACMIDC
2010
13 years 11 months ago
Paper-based multimedia interaction as learning tool for disabled children
The purpose of our research is to support cognitive, motor, and emotional development of severely disabled children in the school context. We designed and implemented a set of nov...
Franca Garzotto, Manuel Bordogna