Sciweavers

621 search results - page 65 / 125
» Security of Internet Location Management
Sort
View
CCS
2007
ACM
15 years 10 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
WWW
2011
ACM
14 years 11 months ago
Open and decentralized access across location-based services
Users now interact with multiple Location-Based Services (LBS) through a myriad set of location-aware devices and interfaces. However, current LBS tend to be centralized silos wit...
Yiming Liu, Rui Yang, Erik Wilde
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
AICT
2006
IEEE
117views Communications» more  AICT 2006»
15 years 10 months ago
Mapping DiffServ to MAC differentiation for IEEE 802.11e
In Internet, the user's traffic crosses several domains. More and more the users want end-to-end quality of service (QoS). So it’s necessary to have differentiation mechani...
Mounir Frikha, Tibi Najet, Faiza Tabbana
VLDB
1998
ACM
116views Database» more  VLDB 1998»
15 years 8 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula