Sciweavers

14824 search results - page 2913 / 2965
» Security - Introduction
Sort
View
LISA
2003
15 years 9 days ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
USENIX
2003
15 years 9 days ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
WISES
2003
15 years 9 days ago
Locating Moving Objects over Mobile Sensor Network
The purpose of our on going research would be to track entities, which enter their field of vision over the sensor network. Based on their sightings, they maintain a dynamic cache ...
Arvind Nath Rapaka, Sandeep Bogollu, Donald C. Wun...
ECIS
2000
15 years 9 days ago
The Learning Administration - Shaping Change and Taking Off into the Future
- E-services will change the future of business as well as private relationships. The rearrangement of value chains, new competitive arenas and the growing necessity and interest i...
Hans-Jörg Bullinger, Werner Brettreich-Teichm...
ECIS
2000
15 years 9 days ago
Trust in Electronic Learning and Teaching Relationships: The Case of WINFO-Line
Electronic relationships in the context of electronic commerce and especially in the context of electronic learning and teaching are on the rise. However, besides the well known te...
Harald F. O. von Kortzfleisch, Udo Winand
« Prev « First page 2913 / 2965 Last » Next »