Sciweavers

3581 search results - page 150 / 717
» Modeling the Internet
Sort
View
130
Voted
ECOWS
2006
Springer
15 years 7 months ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
168
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Krishna K. Ramachandran, Biplab Sikdar
178
Voted
APWEB
2011
Springer
14 years 7 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
129
Voted
ICC
2009
IEEE
155views Communications» more  ICC 2009»
15 years 10 months ago
Modeling Random Walk Search Algorithms in Unstructured P2P Networks with Social Information
—Random walk (RW) has been widely used as a strategy for searching in peer-to-peer networks. The boom of social network applications introduces new impact to the classical algori...
Jing Xie, King-Shan Lui
112
Voted
WWW
2008
ACM
16 years 4 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...