Sciweavers

2057 search results - page 301 / 412
» From content distribution networks to content networks - iss...
Sort
View
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
13 years 12 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
DGO
2004
112views Education» more  DGO 2004»
13 years 9 months ago
Exploration and Exploitation: Knowledge Sharing in Digital Government Projects
This paper examines knowledge sharing processes in digital government projects (DGPs). Although knowledge sharing processes are a central feature of the functioning of government,...
Maria Christina Binz-Scharf
ECIS
2000
13 years 9 months ago
The Extensible Markup Language - New Opportunities in the Area of EDI
: Only about 5% of the companies which could profit from EDI actually use it. The main reason is that especially small and medium-sized enterprises (SMEs) try to avoid the consider...
Tim Weitzel, Frank Ladner, Peter Buxmann
NETWORK
2006
290views more  NETWORK 2006»
13 years 7 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
CN
2004
106views more  CN 2004»
13 years 7 months ago
An overlay framework for provisioning differentiated services in Source Specific Multicast
Scalability in QoS-aware multicast deployment has become an important research dimension in recent years. In this paper we propose a new scheme named Differentiated QoS Multicast ...
Ning Wang, George Pavlou