Sciweavers

5123 search results - page 74 / 1025
» Performance and Security Tradeoff
Sort
View
SERVICES
2008
71views more  SERVICES 2008»
14 years 11 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
72
Voted
COMCOM
2004
137views more  COMCOM 2004»
14 years 10 months ago
Security performance of loaded IEEE 802.11b wireless networks
Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b ...
Nilufar Baghaei, Ray Hunt
COMPSEC
2004
156views more  COMPSEC 2004»
14 years 10 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
84
Voted
COMPCON
1994
IEEE
15 years 2 months ago
Low Power Hardware for a High Performance PDA
The first product in the Newton family operates under severe constraints in the areas of performance, cost, heat dissipation, power consumption, scalability, size and weight. This...
Michael Culbert
KDD
2000
ACM
129views Data Mining» more  KDD 2000»
15 years 1 months ago
Evolutionary algorithms in data mining: multi-objective performance modeling for direct marketing
Predictive models in direct marketing seek to identify individuals most likely to respond to promotional solicitations or other intervention programs. While standard modeling appr...
Siddhartha Bhattacharyya