Sciweavers

5324 search results - page 751 / 1065
» Internet Security Protocols
Sort
View
ICC
2007
IEEE
14 years 5 months ago
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Joel O. Sandin, Bilal Khan
ESWS
2007
Springer
14 years 5 months ago
Extensible SPARQL Functions with Embedded Javascript
Abstract. The SPARQL Query Language allows filtering of query results through arbitrary predicate expressions. Such expressions may invoke custom functions identified with IRIs, ...
Greg Williams
EEE
2005
IEEE
14 years 4 months ago
Towards Access Control for Visual Web Model Management
With the advance of E-Commerce over Web-based information, the interoperability of isolated XML repositories and databases over the Internet has drawn an increasing interest recen...
Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingh...
ICNC
2005
Springer
14 years 4 months ago
A Natural Language Watermarking Based on Chinese Syntax
Abstract. A novel text watermarking algorithm is presented. It combines natural language watermarking and Chinese syntax based on BP neural networks. Since the watermarking signals...
Yuling Liu, Xingming Sun, Yong Wu
ISN
1998
Springer
14 years 3 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...