Sciweavers

1170 search results - page 199 / 234
» Between ends and fibers
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 5 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
SSD
2009
Springer
145views Database» more  SSD 2009»
15 years 5 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 5 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
EDOC
2008
IEEE
15 years 5 months ago
Reliable Discovery and Selection of Composite Services in Mobile Environments
Service providers as we know them nowadays are the always-on “static” web service providers, that aim at Five9 availability (99.999%). Formal, or de-facto, standards, such as ...
Lucia Del Prete, Licia Capra
GLOBECOM
2008
IEEE
15 years 5 months ago
An Empirical Study of Flash Crowd Dynamics in a P2P-Based Live Video Streaming System
—Peer-to-Peer (P2P) based live video streaming system has emerged as a promising solution for the Internet video streaming applications, partly evident from commercial deployment...
Bo Li, Gabriel Yik Keung, Susu Xie, Fangming Liu, ...