Sciweavers

3972 search results - page 702 / 795
» Design of the iSCSI Protocol
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
ICWS
2007
IEEE
13 years 11 months ago
Search Algorithms for Discovery of Web Services
Web services are designed to standardize interactions between heterogeneous applications using Internet technologies. Within the framework of Internet search technologies, Web ser...
Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng
ICWS
2007
IEEE
13 years 11 months ago
Web Services Methods for Communication over IP
In this paper, we study web services methods and approaches to enable real-time communication services over IP. This approach extends web services methodologies from service integ...
Wu Chou, Li Li, Feng Liu
LREC
2008
102views Education» more  LREC 2008»
13 years 11 months ago
Unsupervised Learning-based Anomalous Arabic Text Detection
The growing dependence of modern society on the Web as a vital source of information and communication has become inevitable. However, the Web has become an ideal channel for vari...
Nasser Abouzakhar, Ben Allison, Louise Guthrie
IJCAI
2007
13 years 11 months ago
Communicating Effectively in Resource-Constrained Multi-Agent Systems
Agents with partial observability need to share information to achieve decentralised coordination. However, in resource-constrained systems, indiscriminate communication can creat...
Partha Sarathi Dutta, Claudia V. Goldman, Nicholas...