Sciweavers

13966 search results - page 2784 / 2794
» Internet as a
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
JIS
2011
112views more  JIS 2011»
12 years 10 months ago
Classifying ecommerce information sharing behaviour by youths on social networking sites
Teenagers and young adults form an economically critical demographic group and are confronted with an array of internet social networking services just as they are forming online ...
Bernard J. Jansen, Kate Sobel, Geoff Cook
JSAC
2011
123views more  JSAC 2011»
12 years 10 months ago
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks
—The growth of real-time content streaming over the Internet has resulted in the use of peer-to-peer (P2P) approaches for scalable content delivery. In such P2P streaming systems...
Srinivas Shakkottai, R. Srikant, Lei Ying
PODC
2011
ACM
12 years 10 months ago
Robust network supercomputing without centralized control
Internet supercomputing is becoming an increasingly popular means for harnessing the power of a vast number of interconnected computers. This comes at a cost substantially lower t...
Seda Davtyan, Kishori M. Konwar, Alexander A. Shva...
SACMAT
2011
ACM
12 years 10 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
« Prev « First page 2784 / 2794 Last » Next »