Sciweavers

819 search results - page 159 / 164
» Component-oriented network management system development
Sort
View
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 3 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
CSCW
2006
ACM
14 years 9 months ago
Scientific Data Collections and Distributed Collective Practice
As the basic sciences become increasingly information-intensive, the management and use of research data presents new challenges in the collective activities that constitute schola...
Melissa H. Cragin, Kalpana Shankar
SIGIR
1992
ACM
15 years 1 months ago
Classifying News Stories using Memory Based Reasoning
ct tasks such as extraction of relational information from text [Young] [Jacobs]. We describe a method for classifying news stories using Alternative systems [Biebricher] [Lewis] u...
Brij M. Masand, Gordon Linoff, David L. Waltz
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 3 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
SEMWEB
2004
Springer
15 years 2 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin