Sciweavers

824 search results - page 137 / 165
» Law-Governed Internet Communities
Sort
View
CCS
2006
ACM
14 years 4 days ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
GECCO
2006
Springer
186views Optimization» more  GECCO 2006»
14 years 3 days ago
Characterizing large text corpora using a maximum variation sampling genetic algorithm
An enormous amount of information available via the Internet exists. Much of this data is in the form of text-based documents. These documents cover a variety of topics that are v...
Robert M. Patton, Thomas E. Potok
ACSAC
2001
IEEE
14 years 3 days ago
Information Security: Science, Pseudoscience, and Flying Pigs
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
Roger R. Schell
ER
2000
Springer
186views Database» more  ER 2000»
14 years 1 days ago
Conceptual Design of Electronic Product Catalogs Using Object-Oriented Hypermedia Modeling Techniques
The application of conceptual models that assure both the consistency and usability of Electronic Product Catalogs (EPC's) is a main concern in the e-commerce community, mainl...
Cristina Cachero, Jaime Gómez, Oscar Pastor
DAC
2010
ACM
13 years 11 months ago
Electronic design automation for social networks
Online social networks are a growing internet phenomenon: they connect millions of individuals through sharing of common interests, political and religious views, careers, etc. So...
Andrew DeOrio, Valeria Bertacco