Sciweavers

11603 search results - page 2192 / 2321
» Securing Embedded Systems
Sort
View
DSN
2005
IEEE
15 years 8 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
135
Voted
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
15 years 8 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 8 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
118
Voted
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 8 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ICNP
2005
IEEE
15 years 8 months ago
MuON: Epidemic Based Mutual Anonymity
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean...
« Prev « First page 2192 / 2321 Last » Next »