Sciweavers

5324 search results - page 751 / 1065
» Internet Security Protocols
Sort
View
72
Voted
ICC
2007
IEEE
15 years 7 months ago
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Joel O. Sandin, Bilal Khan
83
Voted
ESWS
2007
Springer
15 years 6 months ago
Extensible SPARQL Functions with Embedded Javascript
Abstract. The SPARQL Query Language allows filtering of query results through arbitrary predicate expressions. Such expressions may invoke custom functions identified with IRIs, ...
Greg Williams
90
Voted
EEE
2005
IEEE
15 years 6 months ago
Towards Access Control for Visual Web Model Management
With the advance of E-Commerce over Web-based information, the interoperability of isolated XML repositories and databases over the Internet has drawn an increasing interest recen...
Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingh...
85
Voted
ICNC
2005
Springer
15 years 6 months ago
A Natural Language Watermarking Based on Chinese Syntax
Abstract. A novel text watermarking algorithm is presented. It combines natural language watermarking and Chinese syntax based on BP neural networks. Since the watermarking signals...
Yuling Liu, Xingming Sun, Yong Wu
94
Voted
ISN
1998
Springer
15 years 4 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...