Sciweavers

3047 search results - page 74 / 610
» A Secure Distributed Search System
Sort
View
123
Voted
EUROMICRO
2000
IEEE
15 years 7 months ago
A Universal Framework for Managing Metadata in the Distributed Dragon Slayer System
In the multimedia field, metadata are becoming increasingly important for efficiently cataloguing the abundant flood of information. (Metadata are data on information structure...
Horst Wedde, Jens-Oliver P. Siepmann
ICSE
2009
IEEE-ACM
15 years 9 months ago
Semantics-based code search
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user’s specifications. The key words here are spec...
Steven P. Reiss
TKDE
2010
272views more  TKDE 2010»
15 years 1 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
15 years 4 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
APSEC
2006
IEEE
15 years 9 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han