Sciweavers

11594 search results - page 2296 / 2319
» Cooperation in Service Systems
Sort
View
GLOBECOM
2009
IEEE
14 years 14 days ago
Competitive Wireless Access for Data Streaming over Vehicle-to-Roadside Communications
This paper considers the problem of optimal and competitive wireless access for data streaming over vehicleto-roadside (V2R) communication. In a service area, the onboard units (OB...
Dusit Niyato, Ekram Hossain, Ping Wang
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
14 years 11 days ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
BPM
2006
Springer
166views Business» more  BPM 2006»
14 years 11 days ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
FC
2006
Springer
129views Cryptology» more  FC 2006»
14 years 8 days ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
ACSAC
2001
IEEE
14 years 8 days ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
« Prev « First page 2296 / 2319 Last » Next »