Sciweavers

4445 search results - page 756 / 889
» Reflective Authorization Systems
Sort
View
PVLDB
2010
158views more  PVLDB 2010»
14 years 8 months ago
Building Ranked Mashups of Unstructured Sources with Uncertain Information
Mashups are situational applications that join multiple sources to better meet the information needs of Web users. Web sources can be huge databases behind query interfaces, which...
Mohamed A. Soliman, Ihab F. Ilyas, Mina Saleeb
VIROLOGY
2010
128views more  VIROLOGY 2010»
14 years 8 months ago
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
This research proposes a novel automatic method (termed Auto-Sign) for extracting unique signatures of malware executables to be used by high-speed malware filtering devices based...
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Roka...
WOTE
2010
14 years 8 months ago
On Some Incompatible Properties of Voting Schemes
Abstract. In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we ...
Benoît Chevallier-Mames, Pierre-Alain Fouque...
FGIT
2010
Springer
14 years 8 months ago
Improved Location Aided Cluster Based Routing Protocol for GPS Enabled Manets
Routing has been the main challenge for ad hoc networks due to dynamic topology as well as resource constraints. Completely GPS free as well as GPS scarce positioning systems for ...
S. Mangai, A. Tamilarasi
IPPS
2010
IEEE
14 years 8 months ago
Use of Peer-To-Peer technology in Internet access networks and its impacts
Abstract--Objectives of the dissertation are impacts of Peerto-Peer (P2P) traffic on Internet core networks as well as novel approaches for using P2P technology in Internet access ...
Peter Danielis, Dirk Timmermann