Sciweavers

590 search results - page 94 / 118
» Security Issues in VOIP Applications
Sort
View
PST
2008
13 years 9 months ago
LogView: Visualizing Event Log Clusters
Event logs or log files form an essential part of any network management and administration setup. While log files are invaluable to a network administrator, the vast amount of dat...
Adetokunbo Makanju, Stephen Brooks, A. Nur Zincir-...
MTA
2006
125views more  MTA 2006»
13 years 7 months ago
QCWS: an implementation of QoS-capable multimedia web services
QoS, that defines service quality such as latency, availability, timeliness and reliability, is important for web applications that provide real-time information, multimedia conte...
Tao Yu, Kwei-Jay Lin
IJIPT
2007
91views more  IJIPT 2007»
13 years 7 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins
ECR
2002
160views more  ECR 2002»
13 years 7 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
TKDE
2008
154views more  TKDE 2008»
13 years 7 months ago
Watermarking Relational Databases Using Optimization-Based Techniques
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In th...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor