Sciweavers

1863 search results - page 296 / 373
» Security Architecture for Web Services
Sort
View
CCS
2007
ACM
15 years 6 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
ICCCN
1998
IEEE
15 years 4 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
AGENTS
2001
Springer
15 years 3 months ago
Configuration management for multi-agent systems
As heterogeneous distributed systems, multi-agent systems present some challenging con guration management issues. There are the problems of knowing how to allocate agents to comp...
Joseph A. Giampapa, Octavio H. Juarez-Espinosa, Ka...

Tutorial
2179views
17 years 2 days ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel
SAC
2004
ACM
15 years 5 months ago
Knowledge-based conversational agents and virtual storytelling
Abstract. We describe an architecture for building speech-enabled conversational agents, deployed as self-contained Web services, with ability to provide inference processing on ve...
Paul Tarau, Elizabeth Figa