Sciweavers

1362 search results - page 234 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
DRM
2004
Springer
15 years 7 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
SIGCOMM
1994
ACM
15 years 6 months ago
An Architecture for Wide-Area Multicast Routing
Existing multicast routing mechanisms were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. When group members, and sende...
Stephen E. Deering, Deborah Estrin, Dino Farinacci...
ESEM
2010
ACM
15 years 16 days ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
15 years 5 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
DPD
2000
93views more  DPD 2000»
15 years 1 months ago
Ontological Approach for Information Discovery in Internet Databases
The Internet has solved the age-old problem of network connectivity and thus enabling the potential access to, and data sharing among large numbers of databases. However, enabling ...
Mourad Ouzzani, Boualem Benatallah, Athman Bouguet...