Sciweavers

135 search results - page 18 / 27
» Implementing an agent trade server
Sort
View
WEBI
2004
Springer
14 years 28 days ago
Self-Protection of Web Content
In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
Hoi Chan, Trieu C. Chieu
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
SIGCOMM
1999
ACM
13 years 12 months ago
Quality Adaptation for Congestion Controlled Video Playback over the Internet
Streaming audio and video applications are becoming increasingly popular on the Internet, and the lack of effective congestion control in such applications is now a cause for sign...
Reza Rejaie, Mark Handley, Deborah Estrin
IAT
2010
IEEE
13 years 5 months ago
4s-reasoner: RDFS Backward Chained Reasoning Support in 4store
This paper describes the design and implementation of backward chained clustered RDFS reasoning in 4store. The system presented, called "4s-reasoner", adds no overhead t...
Manuel Salvadores, Gianluca Correndo, Tope Omitola...
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
14 years 1 months ago
A New Approach for Reactive Web Usage Data Processing
— Web usage mining exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web (WWW) users. The required information is captured b...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar