Sciweavers

20638 search results - page 4046 / 4128
» Computer Networks
Sort
View
SWS
2004
ACM
15 years 3 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
WWW
2004
ACM
15 years 3 months ago
Flexible on-device service object replication with replets
An increasingly large amount of such applications employ service objects such as Servlets to generate dynamic and personalized content. Existing caching infrastructures are not we...
Dong Zhou, Nayeem Islam, Ali Ismael
CCS
2004
ACM
15 years 3 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
MM
2003
ACM
146views Multimedia» more  MM 2003»
15 years 3 months ago
Supporting timeliness and accuracy in distributed real-time content-based video analysis
Real-time content-based access to live video data requires content analysis applications that are able to process the video data at least as fast as the video data is made availab...
Viktor S. Wold Eide, Frank Eliassen, Ole-Christoff...
HICSS
2000
IEEE
180views Biometrics» more  HICSS 2000»
15 years 2 months ago
Evolving Use of a System for Education at a Distance
Computers and networks are increasingly able to support distributed collaborative multimedia applications. In fact, the growing interest in distance learning reflects the awarenes...
Stephen A. White, Anoop Gupta, Jonathan Grudin, Ha...
« Prev « First page 4046 / 4128 Last » Next »