Sciweavers

5324 search results - page 729 / 1065
» Internet Security Protocols
Sort
View
SEC
2004
15 years 5 months ago
Spam Filter Analysis
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, hav...
Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Ni...
COMCOM
2002
139views more  COMCOM 2002»
15 years 4 months ago
A novel mechanism for providing service differentiation over CATV network
With the emersion of new types of applications on the Internet, the need of broadband access is unavoidable. It also makes the differentiation of services provided by the network ...
Kuo-Chih Chu, Yi-Gang Tai, Wei-Tsong Lee, Pau-Choo...
ETT
2002
104views Education» more  ETT 2002»
15 years 4 months ago
Generalized window advertising for TCP congestion control
Congestion in the Internet is a major cause of network performance degradation. The Generalized Window Advertising (GWA) scheme proposed in this paper is a new approach for enhanci...
Mario Gerla, Renato Lo Cigno, Saverio Mascolo, Wen...
PERCOM
2004
ACM
16 years 4 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
15 years 11 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...