Sciweavers

8770 search results - page 1678 / 1754
» Named Service Networking
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 10 days ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ISSA
2004
15 years 10 days ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
ECIS
2003
15 years 10 days ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
MMNS
2004
161views Multimedia» more  MMNS 2004»
15 years 10 days ago
Adaptive Video Streaming in Presence of Wireless Errors
Real-time video streaming with rate adaptation to network load/congestion represents an efficient solution to its coexistence with conventional TCP data services. Naturally, the st...
Guang Yang 0001, Mario Gerla, Medy Sanadidi
IADIS
2003
15 years 10 days ago
Personalization of Information Delivery by the Use of Agents
Mass, multi-channel, network access to information requires a solution of several problems related to proper information delivery, including an important problem of adjusting data...
Jarogniew Rykowskia, Arkadiusz Juszkiewicz
« Prev « First page 1678 / 1754 Last » Next »