Sciweavers

2081 search results - page 265 / 417
» Content pricing in the Internet
Sort
View
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 7 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
APWEB
2003
Springer
15 years 7 months ago
Trends in Mobile Multimedia and Networks
NTT DoCoMo is the company to ”DO COmmunications over the MObile Network”. It reached 43 million subscribers in Japan, early 2003. This presentation covers the multimedia servic...
Minoru Etoh
ICWE
2003
Springer
15 years 7 months ago
The Cooperative Web: A Step towards Web Intelligence
The Web is mainly processed by humans. The role of the machines is just to transmit and display the contents of the documents, barely being able to do something else. Nowadays ther...
Daniel Gayo-Avello, Darío Álvarez Gu...
ISMVL
2010
IEEE
164views Hardware» more  ISMVL 2010»
15 years 6 months ago
On the Number of Products to Represent Interval Functions by SOPs with Four-Valued Variables
Abstract—Let A and B be integers such that A ≤ B. An nvariable interval function is a mapping IN[n : A, B] : {0, 1}n → {0, 1}, where IN[n : A, B](X) = 1 iff A ≤ X ≤ B. Su...
Tsutomu Sasao
ICDCSW
2002
IEEE
15 years 6 months ago
A Demand based Algorithm for Rapid Updating of Replicas
In many Internet scale replicated system, not all replicas can be dealt with in the same way, since some will be in greater demand than others. In the case of weak consistency algo...
Jesús Acosta-Elías, Leandro Navarro-...