Sciweavers

2904 search results - page 199 / 581
» Internet Infrastructure Security
Sort
View
EAGC
2003
Springer
15 years 9 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
ECIS
2000
15 years 5 months ago
Trust in Electronic Learning and Teaching Relationships: The Case of WINFO-Line
Electronic relationships in the context of electronic commerce and especially in the context of electronic learning and teaching are on the rise. However, besides the well known te...
Harald F. O. von Kortzfleisch, Udo Winand
JTAER
2008
82views more  JTAER 2008»
15 years 3 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
NETWORK
2008
233views more  NETWORK 2008»
15 years 3 months ago
WhozThat? evolving an ecosystem for context-aware mobile social networks
One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new ...
Aaron Beach, Mike Gartrell, Sirisha Akkala, Jack E...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
15 years 2 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik