Sciweavers

122 search results - page 17 / 25
» Towards Management Requirements of Future Internet
Sort
View
COMSUR
2007
101views more  COMSUR 2007»
13 years 7 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
AH
2004
Springer
14 years 28 days ago
On the Dynamic Generation of Compound Critiques in Conversational Recommender Systems
Conversational recommender systems help to guide users through a product-space towards a particular product that meets their specific requirements. During the course of a “conve...
Kevin McCarthy, James Reilly, Lorraine McGinty, Ba...
JTAER
2006
100views more  JTAER 2006»
13 years 7 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
SIGCOMM
2009
ACM
14 years 2 months ago
Network virtualization: a view from the bottom
The interest in network virtualization has been growing steadily among the networking community in the last few years. Network virtualization opens up new possibilities for the ev...
Jorge Carapinha, Javier Jiménez
WWW
2006
ACM
14 years 8 months ago
Proposal of integrated search engine of web and TV contents
A search engine that can handle TV programs and Web content in an integrated way is proposed. Conventional search engines have been able to handle Web content and/or data stored i...
Hisashi Miyamori, Mitsuru Minakuchi, Zoran Stejic,...