Sciweavers

2503 search results - page 497 / 501
» Building Computer Network Attacks
Sort
View
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 12 days ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
MIDDLEWARE
2004
Springer
14 years 10 days ago
Guiding Queries to Information Sources with InfoBeacons
The Internet provides a wealth of useful information in a vast number of dynamic information sources, but it is difficult to determine which sources are useful for a given query. ...
Brian F. Cooper
ACMICEC
2003
ACM
118views ECommerce» more  ACMICEC 2003»
14 years 7 days ago
Visualization of EDI messages: facing the problems in the use of XML
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has bec...
Reija Korhonen, Airi Salminen
ISCA
2010
IEEE
210views Hardware» more  ISCA 2010»
14 years 2 days ago
An intra-chip free-space optical interconnect
Continued device scaling enables microprocessors and other systems-on-chip (SoCs) to increase their performance, functionality, and hence, complexity. Simultaneously, relentless s...
Jing Xue, Alok Garg, Berkehan Ciftcioglu, Jianyun ...
SC
2009
ACM
13 years 11 months ago
Web 2.0-based social informatics data grid
The Social Informatics Data Grid (SIDGrid) is a new cyberinfrastructure designed to transform how social and behavioral scientists collect and annotate data, collaborate and share...
Wenjun Wu, Thomas D. Uram, Michael E. Papka