Sciweavers

3082 search results - page 596 / 617
» its 2004
Sort
View
IADIS
2004
14 years 9 days ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
IADIS
2004
14 years 9 days ago
A design of digital rights management system utilizing multimedia content identifiers
All around of people live in the age based on information and knowledge in recent period. It is WWW/Internet technology that provides efficiency and power, which can lead the new ...
Seok-Hoon Kim, Sang-Hoon Oh, Jung-Hoon Hahm
IADIS
2004
14 years 9 days ago
Towards Understanding of Factors Influencing User Acceptance of Mobile Payment Systems
M-payments, which refer to payments over a mobile device, have not taken off as fast as predicted. Their slow adoption rates raise many questions about what drives consumer behavi...
Agnieszka Zmijewska, Elaine Lawrence, Robert Steel...
IC
2004
14 years 9 days ago
An Efficient TCP Buffer Tuning Technique Based on Packet Loss Ratio (TBT-PLR)
The existing TCP (Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high BDP (Bandwidth-Delay Product) because of the fixed small o...
Gi-chul Yoo, Eun-sook Sim, Dongkyun Kim, Taeyoung ...
ICETE
2004
204views Business» more  ICETE 2004»
14 years 9 days ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson