Sciweavers

1709 search results - page 147 / 342
» networks 2000
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Kai Rannenberg, Giovanni Iachello
ECWEB
2000
Springer
372views ECommerce» more  ECWEB 2000»
14 years 2 months ago
Mobile Electronic Commerce: Emerging Issues
Abstract. There are many definitions for Mobile Electronic Commerce (MCommerce). We define M-Commerce as any type of transaction of an economic value having at least at one end a m...
Aphrodite Tsalgatidou, Jari Veijalainen
ESANN
2000
13 years 11 months ago
A comparative design of a MIMO neural adaptive rate damping for a nonlinear helicopter model
Using a nonlinear 15-state helicopter model in 6 DOF, two di erent neural control systems, both acting as rate damping, have been designed and compared. They are both based on the ...
Piero A. Gili, Manuela Battipede
CCR
2000
101views more  CCR 2000»
13 years 10 months ago
A web server's view of the transport layer
This paper presents observations of traffic to and from a particular World-Wide Web server over the course a year and a half. This paper presents a longitudinal look at various ne...
Mark Allman
FGCS
2000
131views more  FGCS 2000»
13 years 10 months ago
Keystroke dynamics as a biometric for authentication
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives...
Fabian Monrose, Aviel D. Rubin