Sciweavers

95 search results - page 19 / 19
» Authenticated Access to Reserved Network Resources
Sort
View
NSDI
2008
13 years 7 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
HUC
2010
Springer
13 years 3 months ago
UBI challenge workshop 2010: real world urban computing
This workshop promotes ubiquitous computing research in authentic urban setting, with real users and with sufficient scale and time span. We first motivate why such research is im...
Timo Ojala, Jukka Riekki
RAID
2004
Springer
13 years 10 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
CIA
1999
Springer
13 years 9 months ago
Mobile-Agent Mediated Place Oriented Communication
When we communicate with others in a most primitive way like face-to-face conversation, we normally gather at a common physical place. This physical constraint has been recognized ...
Yasuhiko Kitamura, Yasuhiro Mawarimichi, Shoji Tat...
BMCBI
2007
177views more  BMCBI 2007»
13 years 5 months ago
Biowep: a workflow enactment portal for bioinformatics applications
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...