Sciweavers

856 search results - page 147 / 172
» Location Management in Pervasive Systems
Sort
View
NDSS
2006
IEEE
14 years 3 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
SKG
2006
IEEE
14 years 3 months ago
XML Metadata Services
— As the Service Oriented Architecture (SOA) principles have gained importance, an emerging need has appeared for methodologies to locate desired services that provide access to ...
Mehmet S. Aktas, Sangyoon Oh, Geoffrey Fox, Marlon...
CCGRID
2005
IEEE
14 years 3 months ago
Semantic integration of file-based data for grid services
Data services for the Grid have focussed so far primarily on virtualising access to distributed databases, and encapsulating file location. However, orchestration of services requ...
Andrew Woolf, Ray Cramer, Marta Gutierrez, Kerstin...
DEXAW
2005
IEEE
140views Database» more  DEXAW 2005»
14 years 3 months ago
Effective Dynamic Replication in Wide-Area Network Environments: A Perspective
The unprecedented growth of data at geographically distributed locations coupled with tremendous improvement in networking capabilities over the last decade strongly motivate the ...
Anirban Mondal, Masaru Kitsuregawa
SAC
2004
ACM
14 years 3 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen