Sciweavers

1139 search results - page 123 / 228
» Trust Management Survey
Sort
View
EG
2007
92views more  EG 2007»
13 years 8 months ago
Service innovation for e-government: a broadband-based example
: This paper investigates the relationship between broadband and service innovation in an e-government context. We ask, what characterizes successful broadband based service innova...
Bendik Bygstad, Gjermund Lanestedt, Jyoti Choudrie
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
14 years 2 months ago
Three Case Studies of Large-Scale Data Flows
We survey three examples of large-scale scientific workflows that we are working with at Cornell: the Arecibo sky survey, the CLEO high-energy particle physics experiment, and t...
William Y. Arms, Selcuk Aya, Manuel Calimlim, Jim ...
TSE
2002
98views more  TSE 2002»
13 years 7 months ago
Measurement Programs in Software Development: Determinants of Success
Measurement programs in software organizations are an important source of control over quality and cost in software development. The findings of this research presented here are ba...
Anandasivam Gopal, Mayuram S. Krishnan, Tridas Muk...
INFOSCALE
2009
ACM
14 years 2 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 2 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...