Sciweavers

2804 search results - page 513 / 561
» Next Generation Internet
Sort
View
COMCOM
2002
105views more  COMCOM 2002»
13 years 8 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
ADCM
1998
133views more  ADCM 1998»
13 years 8 months ago
Numerical exploitation of symmetry in integral equations
: Linear integral operators describing physical problems on symmetric domains often are equivariant, which means that they commute with certain symmetries, i.e., with a group of or...
Eugene L. Allgower, Kurt Georg
TC
2002
13 years 8 months ago
Dynamically Selecting Optimal Distribution Strategies for Web Documents
To improve the scalability of the Web it is common practice to apply caching and replication techniques. Numerous strategies for placing and maintaining multiple copies of Web doc...
Guillaume Pierre, Maarten van Steen, Andrew S. Tan...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 7 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
13 years 7 months ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...