Sciweavers

2747 search results - page 420 / 550
» Network externalities in software systems
Sort
View
MOBIDE
2003
ACM
14 years 2 months ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
EUROMICRO
1998
IEEE
14 years 1 months ago
The World Wide Wait: Where Does the Time Go?
The continuing explosive growth of the web has not been matched by an adequate enhancement of the infrastructure on which it depends. Both consumers and producers are often left f...
Colin Allison, Martin Bramley, Jose Serrano
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
14 years 1 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
CCS
2010
ACM
13 years 9 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
INFORMATICALT
2002
131views more  INFORMATICALT 2002»
13 years 8 months ago
An Agent-Based Architecture for Customer Services Management and Product Search
The amount of products and services available over the Internet increases significantly and it soon becomes beyond users ability to analyze and compare them. At the same time the n...
Thomas Heiberg, Mihhail Matskin, Jøran Pede...