Sciweavers

8644 search results - page 1625 / 1729
» On the Composition of Secure Systems
Sort
View
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
14 years 3 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 3 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
14 years 3 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 3 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
ICNP
2005
IEEE
14 years 3 months ago
MuON: Epidemic Based Mutual Anonymity
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean...
« Prev « First page 1625 / 1729 Last » Next »