Sciweavers

3268 search results - page 622 / 654
» Structured Service Composition
Sort
View
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 4 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
14 years 4 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
ELPUB
2006
ACM
14 years 4 months ago
Electronic Publishing of Digitised Works
This paper describes the automated process to create structured master and access copies for the digitised works at the BND – National Digital Library. The BND created during 20...
João Penas, João Gil, Gilberto Pedro...
IWRIDL
2006
ACM
141views Education» more  IWRIDL 2006»
14 years 4 months ago
Shallow syntax analysis in Sanskrit guided by semantic nets constraints
We present the state of the art of a computational platform for the analysis of classical Sanskrit. The platform comprises modules for phonology, morphology, segmentation and shal...
Gérard P. Huet
P2P
2005
IEEE
189views Communications» more  P2P 2005»
14 years 4 months ago
Proximity Neighbor Selection for a DHT in Wireless Multi-Hop Networks
A mobile ad hoc network (MANET) is a multi-hop wireless network having no infrastructure. Thus, the mobile nodes have to perform basic control tasks, such as routing, and higher-l...
Curt Cramer, Thomas Fuhrmann