Sciweavers

644 search results - page 104 / 129
» IMS based IPTV services: architecture and implementation
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
ECOWS
2006
Springer
13 years 11 months ago
AMPol: Adaptive Messaging Policy
Interoperability in a large-scale distributed system is challenged by by the diversity of node policies. We introduce AMPol (Adaptive Messaging Policy), a serviceoriented architec...
Raja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A...
COMCOM
2006
115views more  COMCOM 2006»
13 years 7 months ago
IPv6 deployment: Real time applications and QoS aspects
This paper gives an overview of the issues related to the QoS mechanisms under IPv6 and the transition of applications to the new Internet protocol. We describe the implementation...
Christos Bouras, Apostolos Gkamas, Dimitris Primpa...
SIGADA
1999
Springer
13 years 12 months ago
Building Tcl-Tk GUIs for HRT-HOOD systems
This work explores Tcl-Tk 8.0 as a tool to easily build script based GUIs for Ada95 realtime systems. Tcl-Tk 8.0 is a library that makes graphic programming easier, but it suffers...
Juan Carlos Díaz Martín, Isidro Iral...
TDP
2010
189views more  TDP 2010»
13 years 2 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...