Sciweavers

6844 search results - page 1362 / 1369
» Web Service Security
Sort
View
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 7 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
CONCURRENCY
2007
118views more  CONCURRENCY 2007»
13 years 7 months ago
Design and implementation issues for distributed CCA framework interoperability
Component frameworks, including those that support the Common Component Architecture (CCA), represent a promising approach to addressing this challenge, one that is being realized...
Madhusudhan Govindaraju, Michael J. Lewis, Kenneth...
IJMMS
2006
100views more  IJMMS 2006»
13 years 7 months ago
A cognitive approach to user perception of multimedia quality: An empirical investigation
Whilst multimedia technology has been one of the main contributing factors behind the Web's success, delivery of personalised multimedia content has been a desire seldom achi...
Sherry Y. Chen, Gheorghita Ghinea, Robert D. Macre...
IPM
2006
157views more  IPM 2006»
13 years 7 months ago
Collaborative bibliography
A bibliography is traditionally characterized by the judgments, bounded by explicit selection criteria, made by a single compiler. Because these criteria concern the attributes as...
David G. Hendry, J. R. Jenkins, Joseph F. McCarthy
DKE
2007
130views more  DKE 2007»
13 years 7 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
« Prev « First page 1362 / 1369 Last » Next »