Sciweavers

1040 search results - page 92 / 208
» Privacy for Telecom Services
Sort
View
ISORC
2002
IEEE
14 years 2 months ago
IKE 2-Implementing the Stateful Distributed Object Paradigm
— This paper describes IKE 2, which is distributed object computing middleware that supports the creation of interoperable realtime distributed applications. These applications a...
J. Russell Noseworthy
LREC
2008
165views Education» more  LREC 2008»
13 years 10 months ago
Design and Data Collection for Spoken Polish Dialogs Database
Spoken corpora provide a critical resource for research, development and evaluation of spoken dialog systems. This paper describes the telephone spoken dialog corpus for Polish cr...
Krzysztof Marasek, Ryszard Gubrynowicz
JUCS
2002
116views more  JUCS 2002»
13 years 8 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
CCS
2006
ACM
14 years 26 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CCS
2010
ACM
13 years 9 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu