Sciweavers

5324 search results - page 821 / 1065
» Internet Security Protocols
Sort
View
96
Voted
DPD
2002
120views more  DPD 2002»
15 years 14 days ago
An Overview of Standards and Related Technology in Web Services
The Internet is revolutionizing business by providing an affordable and efficient way to link companies with their partners as well as customers. Nevertheless, there are problems t...
Aphrodite Tsalgatidou, Thomi Pilioura
121
Voted
JNCA
2007
128views more  JNCA 2007»
15 years 5 days ago
Embedded web server-based home appliance networks
Powerful microcontrollers are used as parts of most home and office appliances of today. Integrating web servers to these intelligent devices will aid in controlling them over th...
M. Can Filibeli, Öznur Özkasap, M. Reha ...
117
Voted
GLOBECOM
2009
IEEE
14 years 10 months ago
Impact of Asymmetric Routing on Statistical Traffic Classification
Statistical traffic classification techniques are often developed under the assumption that monitoring devices can observe the two half-flows composing each traffic session. Howeve...
Manuel Crotti, Francesco Gringoli, Luca Salgarelli
131
Voted
ICWS
2009
IEEE
14 years 10 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino
TMC
2010
137views more  TMC 2010»
14 years 7 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...