Sciweavers

641 search results - page 51 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
EUROPKI
2005
Springer
15 years 3 months ago
A Multipurpose Delegation Proxy for WWW Credentials
Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can t...
Tobias Straub, Thilo-Alexander Ginkel, Johannes Bu...
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
15 years 3 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
ADHOC
2007
134views more  ADHOC 2007»
14 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
ATAL
2006
Springer
15 years 1 months ago
Web presentation system using RST events
Constructing presentations as stories is about presenting events that receive their relevance and meaning within the context of the presentation, and about means to define a well-...
Arturo Nakasone, Helmut Prendinger, Mitsuru Ishizu...
HPCC
2011
Springer
13 years 9 months ago
Achieving Performance and Availability Guarantees with Spot Instances
Abstract—In the Infrastructure-as-a-Service (IaaS) cloud computing market, spot instances refer to virtual servers that are rented via an auction. Spot instances allow IaaS provi...
Michele Mazzucco, Marlon Dumas