Sciweavers

1102 search results - page 23 / 221
» Distributed Key Generation for the Internet
Sort
View
ICMCS
2006
IEEE
136views Multimedia» more  ICMCS 2006»
14 years 1 months ago
PASS: Peer-Aware Silence Suppression for Internet Voice Conferences
A novel tandem-free solution for multiparty VoIP conferences called PASS (Peer-Aware Silence Suppression) is presented. Similar to traditional tandem-free solutions, PASS introduc...
Xun Xu, Li-wei He, Dinei A. F. Florêncio, Yo...
KES
2007
Springer
13 years 7 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
GI
2009
Springer
13 years 5 months ago
Component Governance as a Key Factor for IT Business Alignment of Telecommunications Companies
Abstract: Modern telecommunications companies currently undergo remarkable structural changes to be successful in the Next-Generation markets for communications and content product...
Sebastian Reinisch, Uwe Beyer, Robert Mertens
ICICS
2005
Springer
14 years 1 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
JITECH
2010
116views more  JITECH 2010»
13 years 6 months ago
Design theory for dynamic complexity in information infrastructures: the case of building internet
We propose a design theory that tackles dynamic complexity in the design for Information Infrastructures (IIs) defined as a shared, open, heterogeneous and evolving socio-technica...
Ole Hanseth, Kalle Lyytinen