Sciweavers

239 search results - page 21 / 48
» Internet Traffic Modeling and Future Technology Implications
Sort
View
88
Voted
POPL
2005
ACM
15 years 3 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
74
Voted
QOFIS
2004
Springer
15 years 3 months ago
Cross-Layer Analytical Modeling of Wireless Channels for Accurate Performance Evaluation
Abstract. An intention to adopt IP protocol for future mobile communication and subsequent extension of Internet services to the air interface calls for advanced performance modeli...
Dmitri Moltchanov, Yevgeni Koucheryavy, Jarmo Harj...
126
Voted
SERVICES
2010
201views more  SERVICES 2010»
14 years 4 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
DRM
2003
Springer
15 years 2 months ago
The IP war: apocalypse or revolution?
In the Foundation series, Asimov predicted a 1,000 years of darkness following the fall of the galactic empire. In the book Noir, K.W Jeter describes a world where IP is the ultim...
Tsvi Gal, Howard M. Singer, Laird Popkin
107
Voted
ICWE
2007
Springer
15 years 3 months ago
Squiggle: An Experience in Model-Driven Development of Real-World Semantic Search Engines
Abstract. Search engines are becoming such an easy way to find textual resources that we wish to use them also for multimedia content; however, syntactic techniques, even if promi...
Irene Celino, Emanuele Della Valle, Dario Cerizza,...