Sciweavers

7741 search results - page 1465 / 1549
» Security in Active Networks
Sort
View
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 9 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 9 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ICAS
2005
IEEE
171views Robotics» more  ICAS 2005»
15 years 9 months ago
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
Access to Grid services is currently limited to devices having substantial computing, network and memory resources such as PCs. On the other hand, most of mobile devices do not ha...
Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han...
IPPS
2005
IEEE
15 years 9 months ago
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
Jing Lu, John W. Lockwood
ISCC
2005
IEEE
15 years 9 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
« Prev « First page 1465 / 1549 Last » Next »