Sciweavers

2421 search results - page 306 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
141
Voted
SOUPS
2006
ACM
15 years 11 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little
145
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
A Distributed Alerting Service for Open Digital Library Software
Alerting for Digital Libraries (DL) is an important and useful feature for the library users. To date, two independent services and a few publisher-hosted proprietary services hav...
Annika Hinze, George Buchanan
ISCC
2000
IEEE
160views Communications» more  ISCC 2000»
15 years 9 months ago
The Adaptive Load Service (ALS): An ABR-Like Service for the Internet
In this paper, we present a novel approach for realizing adaptive QoS control in the Internet called the adaptive load service (ALS). ALS was designed in a similar fashion to the ...
Dorgham Sisalem, Henning Schulzrinne
AGENTS
2000
Springer
15 years 9 months ago
Agent communication transfer protocol
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
Alexander Artikis, Jeremy Pitt, Christos Stergiou
VIS
2009
IEEE
216views Visualization» more  VIS 2009»
16 years 6 months ago
Multimodal Vessel Visualization of Mouse Aorta PET/CT Scans
In this paper, we present a visualization system for the visual analysis of PET/CT scans of aortic arches of mice. The system has been designed in close collaboration between resea...
Timo Ropinski, Sven Hermann, Rainer Reich, Mich...