Sciweavers

6919 search results - page 1273 / 1384
» Designing Service Communities
Sort
View
JCSS
2006
102views more  JCSS 2006»
13 years 8 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
JMLR
2006
147views more  JMLR 2006»
13 years 8 months ago
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously growing spam phenomenon. Current server-side anti-spam ...
Giorgio Fumera, Ignazio Pillai, Fabio Roli
EOR
2007
90views more  EOR 2007»
13 years 8 months ago
Tabu search and GRASP for the maximum diversity problem
In this paper, we develop new heuristic procedures for the maximum diversity problem (MDP). This NPhard problem has a significant number of practical applications such as environm...
Abraham Duarte, Rafael Martí
JUCS
2006
98views more  JUCS 2006»
13 years 8 months ago
Modern Technologies in Client-Server Architecture for Geo-based Interactive Web Portals
: The internet is an unlimited growing and most comfortable information and communication base. In this context, web portals on the internet play an important role created for comb...
Pawel Gocek, Michael Hartmann, Heinz Schleusener
NETWORK
2008
94views more  NETWORK 2008»
13 years 8 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
« Prev « First page 1273 / 1384 Last » Next »