Sciweavers

2746 search results - page 83 / 550
» Case Study in Survivable Network System Analysis
Sort
View
HICSS
2005
IEEE
107views Biometrics» more  HICSS 2005»
15 years 3 months ago
Beyond Personal Webpublishing: An Exploratory Study of Conversational Blogging Practices
Although initially developed as low-threshold tools to publish on-line, weblogs increasingly appear to facilitate conversations. The objective of this study is to identify practic...
Lilia Efimova, Aldo de Moor
JUCS
2008
113views more  JUCS 2008»
14 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
GLOBECOM
2008
IEEE
14 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
INFOCOM
2009
IEEE
15 years 4 months ago
Absence of Evidence as Evidence of Absence: A Simple Mechanism for Scalable P2P Search
Abstract—We propose a novel search mechanism for unstructured p2p networks, and show that it is both scalable, i.e., it leads to a bounded query traffic load per peer as the pee...
Stratis Ioannidis, Peter Marbach
IJCIS
2006
161views more  IJCIS 2006»
14 years 9 months ago
Poseidon: a Framework to Assist Web Process Design Based on Business Cases
Systems and infrastructures are currently being developed to support Web services and Web processes. One prominent solution to manage and coordinate Web services is the use of wor...
Jorge Cardoso