Sciweavers

165 search results - page 24 / 33
» Conversational Model Based VoIP Traffic Generation
Sort
View
MOBISYS
2003
ACM
14 years 7 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
WWW
2004
ACM
14 years 8 months ago
Converting UML to OWL ontologies
This paper presents automatic generation of the Web Ontology Language (OWL) from an UML model. The solution is based on an MDA-defined architecture for ontology development and th...
Dragan Gasevic, Dragan Djuric, Vladan Devedzic, Vi...
CTRSA
2005
Springer
121views Cryptology» more  CTRSA 2005»
14 years 1 months ago
Time-Selective Convertible Undeniable Signatures
Undeniable signatures were introduced in 1989 by Chaum and van Antwerpen to limit the self-authenticating property of digital signatures. An extended concept – the convertible un...
Fabien Laguillaumie, Damien Vergnaud
AOSE
2004
Springer
14 years 26 days ago
Formal Semantics for AUML Agent Interaction Protocol Diagrams
Abstract. In this paper we introduce an approach for defining semantics for AUML agent interaction protocol diagrams using Petri net code structures. This approach is based on the...
Lawrence Cabac, Daniel Moldt