Sciweavers

6696 search results - page 1325 / 1340
» Securing social networks
Sort
View
ISSA
2004
13 years 10 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
ODRL
2004
13 years 10 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
CASCON
1996
126views Education» more  CASCON 1996»
13 years 10 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
IPL
2006
141views more  IPL 2006»
13 years 8 months ago
Perfectly Reliable Message Transmission
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous netw...
Arvind Narayanan, K. Srinathan, C. Pandu Rangan
IJISEC
2007
119views more  IJISEC 2007»
13 years 8 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
« Prev « First page 1325 / 1340 Last » Next »