Sciweavers

46 search results - page 5 / 10
» Efficiency considerations between common web applications us...
Sort
View
ICCCN
2008
IEEE
14 years 5 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
WECWIS
1999
IEEE
97views ECommerce» more  WECWIS 1999»
14 years 3 months ago
Speechnet: A Network of Hyperlinked Speech-Accessible Objects
The dominant technology for electronic communication and commerce, the telephone, does not discriminate between sighted and non-sighted users. The web does discriminate. The web i...
Richard A. Frost
INFOCOM
2005
IEEE
14 years 4 months ago
Improved single-round protocols for remote file synchronization
— Given two versions of a file, a current version located on one machine and an outdated version known only to another machine, the remote file synchronization problem is how t...
Utku Irmak, Svilen Mihaylov, Torsten Suel
ASIACRYPT
2008
Springer
14 years 27 days ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
ACL
1998
14 years 7 days ago
Evaluating Response Strategies in a Web-Based Spoken Dialogue Agent
While the notion of a cooperative response has been the focus of considerable research in natural language dialogue systems, there has been little empirical work demonstrating how...
Diane J. Litman, Shimei Pan, Marilyn A. Walker