Sciweavers

3089 search results - page 310 / 618
» services 2008
Sort
View
FC
2008
Springer
81views Cryptology» more  FC 2008»
15 years 6 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper
ICSE
2008
IEEE-ACM
16 years 5 months ago
Formal verification of an automotive scenario in service-oriented computing
We report on the successful application of academic experience with formal modelling and verification techniques to an automotive scenario from the service-oriented computing doma...
Maurice H. ter Beek, Stefania Gnesi, Nora Koch, Fr...
JIS
2007
91views more  JIS 2007»
15 years 4 months ago
Clustering methodologies for identifying country core competencies
is.sagepub.com/cgi/content/abstract/33/1/21 The online version of this article can be found at: Published by: http://www.sagepublications.com On behalf of: Chartered Institute of L...
Ronald N. Kostoff, J. Antonio del Río, H&ea...
CBMS
2008
IEEE
15 years 11 months ago
A Self-Test to Detect a Heart Attack Using a Mobile Phone and Wearable Sensors
This paper describes a heart attack self-test application for a mobile phone which allows potential victims of a heart attack to quickly assess whether they are having a heart att...
Peter Leijdekkers, Valérie Gay
COMSWARE
2008
IEEE
15 years 6 months ago
Collaborative group membership and access control for JXTA
Abstract-- This paper presents a proposal for group membership and access control services for JXTA, both based on the principle of self-organization and collaboration of peer grou...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...