Sciweavers

1102 search results - page 12 / 221
» Distributed Key Generation for the Internet
Sort
View
JCSS
2008
159views more  JCSS 2008»
13 years 7 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
ACMICEC
2007
ACM
145views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Advance selling and internet intermediary: travel distribution strategies in the e-commerce age
We investigate two challenges advance of e-commerce creates for traditional practice of travel distribution. First, we explore whether travel providers benefit from strategically ...
Zhe Qu
BMCBI
2010
132views more  BMCBI 2010»
13 years 7 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
13 years 12 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
ESWS
2009
Springer
14 years 5 days ago
Towards a Semantic Infrastructure for User Generated Mobile Services
This paper presents a research approach towards a semantic infrastructure for user generated mobile services. Building on the concept of semantic microservices, the aim of this wor...
Marcin Davies