Sciweavers

4142 search results - page 207 / 829
» Trusting an Information Agent
Sort
View
AAAI
1996
15 years 5 months ago
Interactive Information Retrieval Systems with Minimalist Representation
Almost any information you might want is becoming available on-line. The problem is how to find what you need. One strategy to improve access to existing information sources, is i...
Eric A. Domeshek, Smadar Kedar, Andrew S. Gordon
ESWA
2002
74views more  ESWA 2002»
15 years 4 months ago
Ontologies for information management: balancing formality, stability, and sharing scope
Ontologies are an emerging paradigm to support declarativity, interoperability, and intelligent services in many areas, such as Agent
Ludger van Elst, Andreas Abecker
INFOSCALE
2009
ACM
15 years 10 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
15 years 8 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
SIGUCCS
1999
ACM
15 years 8 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry