Sciweavers

1833 search results - page 285 / 367
» Mechanized Verification with Sharing
Sort
View
145
Voted
ADBIS
2003
Springer
99views Database» more  ADBIS 2003»
15 years 9 months ago
Towards Collaborative Video Authoring
It’s a long time since video post production became digital, yet the issue of collaborative video authoring has not been seriously investigated so far. In this paper we tackle th...
Boris Novikov, Oleg Proskurnin
CAISE
2003
Springer
15 years 9 months ago
The Emergence of Knowledge e-marketplaces
Abstract. On line Knowledge e-marketplaces (Ke-markets) posses some special challenges for buyers and sellers. Unlike most markets, the product of exchange has some unique characte...
Emanuela Pauselli
ACSAC
2009
IEEE
15 years 9 months ago
A Guided Tour Puzzle for Denial of Service Prevention
Abstract—Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a l...
Mehmud Abliz, Taieb Znati
DSN
2002
IEEE
15 years 9 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
ISCC
2002
IEEE
144views Communications» more  ISCC 2002»
15 years 9 months ago
A hierarchical distributed protocol for MPLS path creation
Network service provisioning involves the control of network resources through signaling, routing and management protocols that achieve Quality of Service and Traffic Engineering ...
Mohamed El-Darieby, Dorina C. Petriu, Jerry Rolia