Sciweavers

311 search results - page 60 / 63
» Criticality analysis of Internet infrastructure
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 1 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
JIS
2011
112views more  JIS 2011»
12 years 11 months ago
Classifying ecommerce information sharing behaviour by youths on social networking sites
Teenagers and young adults form an economically critical demographic group and are confronted with an array of internet social networking services just as they are forming online ...
Bernard J. Jansen, Kate Sobel, Geoff Cook
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 8 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
SIGECOM
2006
ACM
385views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
B2C e-commerce development in Africa: case study of Botswana
The global wave of ICT development has become a strong driving force in almost every aspect of human endeavor. Electronic commerce (e-commerce) is fast gaining a prominent place i...
Faith-Michael E. Uzoka, Geoffrey G. Seleka
INFOCOM
2010
IEEE
13 years 7 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou