Sciweavers

2316 search results - page 401 / 464
» How Asymmetric Is the Internet
Sort
View
CSREASAM
2006
15 years 5 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
GEOINFO
2004
15 years 5 months ago
Mediated Geographic Web Feature Services
Abstract With the proliferation of Geographic Information Systems (GIS) and spatial resources over the Internet, there is an increasing demand for robust geospatial information ser...
Mehdi Essid, Omar Boucelma
IADIS
2004
15 years 5 months ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith
ICETE
2004
159views Business» more  ICETE 2004»
15 years 5 months ago
When Business Models Go Bad: The Music Industry's Future
: The music industry is an interesting example for how business models from the pre-Internet area can get into trouble in the new Internet-based economy. Since 2000, the music indu...
Erik Wilde, Jacqueline Schwerzmann
DC
2001
15 years 5 months ago
The use of Metadata in Denmark
A wide range of metadata projects in Denmark over the last 4-5 years are described. A new Danish legal deposit act in 1997 facilitated cooperation in the creation of a common appl...
Leif Andresen