Sciweavers

9095 search results - page 1819 / 1819
» Service RT Systems
Sort
View
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
14 years 7 months ago
Efficient Query Subscription Processing in a Multicast Environment
Abstract Arturo Crespo, Orkut Buyukkokten, and Hector Garcia-Molina Stanford University With information dissemination (information push), data is delivered from a set of producers...
Arturo Crespo, Orkut Buyukkokten, Hector Garcia-Mo...
WWW
2009
ACM
14 years 6 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 2 days ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
GI
2008
Springer
13 years 6 months ago
Von der Accountverwaltung zum erweiterten Identity Management
Abstract: Das Identity Management (IDM) an Hochschulen ist in der Praxis angekommen und muss sich in der Realit¨at bew¨ahren. Hierzu z¨ahlt einerseits die Integration von Datenb...
Tarik Gasmi, Gerhard Schneider, Dirk von Suchodole...
CCS
2009
ACM
14 years 6 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
« Prev « First page 1819 / 1819 Last » Next »