Sciweavers

11 search results - page 2 / 3
» Electronic Submission Protocol Based on Temporal Accountabil...
Sort
View
IJNSEC
2007
111views more  IJNSEC 2007»
13 years 4 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
AIME
1997
Springer
13 years 8 months ago
A Task-Specific Ontology for the Application and Critiquing of Time-Oriented Clinical Guidelines
: Clinical guidelines reuse existing clinical procedural knowledge while leaving room for flexibility by the care provider applying that knowledge. Guidelines can be viewed as gene...
Yuval Shahar, Silvia Miksch, Peter Johnson
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
COMCOM
2008
153views more  COMCOM 2008»
13 years 4 months ago
Available bandwidth estimation and admission control for QoS routing in wireless mesh networks
This article presents an integrated admission control and routing mechanism for multi-rate wireless mesh networks. Admission control depends on precise estimates of available band...
Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar...
CASCON
2003
116views Education» more  CASCON 2003»
13 years 6 months ago
Workload characterization for an E-commerce web site
Electronic commerce servers have a significant presence in today’s Internet. Corporations require good performance for their business processes. To date, little empirical evide...
Qing Wang, Dwight J. Makaroff, H. Keith Edwards, R...