Sciweavers

2493 search results - page 484 / 499
» A survey of network virtualization
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 11 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CACM
2006
102views more  CACM 2006»
14 years 11 months ago
Infoglut
whose titles and abstracts sound very interesting, the pile of unread reports continues to grow on the table in my office." (How quaint the terminology: mail and electronic me...
Peter J. Denning
CN
2006
85views more  CN 2006»
14 years 11 months ago
A scalable and decentralized fast-rerouting scheme with efficient bandwidth sharing
This paper focuses on the protection of virtual circuits (Label Switched Paths, LSPs) in a (G)MPLS (Generalised Multi-Protocol Label Switching) network. The proposed algorithm is ...
Simon Balon, Laurent Mélon, Guy Leduc
IJMMS
2007
91views more  IJMMS 2007»
14 years 11 months ago
Mining communities and their relationships in blogs: A study of online hate groups
Blogs, often treated as the equivalence of online personal diaries, have become one of the fastest growing types of Web-based media. Everyone is free to express their opinions and...
Michael Chau, Jennifer Jie Xu
IJWIS
2007
153views more  IJWIS 2007»
14 years 11 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...