Sciweavers

2316 search results - page 390 / 464
» How Asymmetric Is the Internet
Sort
View
ICDCS
2002
IEEE
15 years 9 months ago
An Optimal Strategy for Anonymous Communication Protocols
For many Internet applications, the ability to protect the identity of participants in a distributed applications is critical. For such applications, a number of anonymous communi...
Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
NDSS
2002
IEEE
15 years 9 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
WECWIS
2002
IEEE
130views ECommerce» more  WECWIS 2002»
15 years 9 months ago
A New Category of Business Negotiation Primitives for Bilateral Negotiation Agents and Associated Algorithm to Find Pareto Optim
How to conduct automated business negotiation over the Internet is an important issue for agent research. In most bilateral negotiation models, two negotiation agents negotiate by...
Haifei Li
CISIS
2009
IEEE
15 years 9 months ago
Smews: Smart and Mobile Embedded Web Server
—In this paper, we show that Web protocols and technologies are good candidates to design the Internet of Things, through a user-centric architecture (the user simply has to use ...
Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vand...
WIKIS
2009
ACM
15 years 9 months ago
Wikis4SE 2009: wikis for software engineering
Due to the simplicity, attractiveness and effectiveness for collaborative authoring and knowledge management, wikis are now massively disseminated and used in different domains. T...
Ademar Aguiar, Nuno Flores, Paulo Merson