Sciweavers

828 search results - page 12 / 166
» Cost Estimation for Web Applications
Sort
View
GI
2003
Springer
14 years 18 days ago
Two-Factor Web Authentication Via Voice
: The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures...
Jörg Tacke, Andreas Wolf
WAIM
2005
Springer
14 years 26 days ago
Integrative Security Management for Web-Based Enterprise Applications
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 7 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
NIPS
2003
13 years 8 months ago
Fast Algorithms for Large-State-Space HMMs with Applications to Web Usage Analysis
In applying Hidden Markov Models to the analysis of massive data streams, it is often necessary to use an artificially reduced set of states; this is due in large part to the fac...
Pedro F. Felzenszwalb, Daniel P. Huttenlocher, Jon...
DAGSTUHL
2007
13 years 8 months ago
On the Cost of Shifting Event Processing within Wireless Environments
With the emergence of wireless sensor networks, the issues of event recognition and processing have been partially shifted into the embedded domain. New processing capabilities on...
Kirsten Terfloth, Katharina Hahn, Agnès Voi...