Sciweavers

1739 search results - page 324 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
ACSAC
2001
IEEE
15 years 3 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
ARTQOS
2003
Springer
15 years 3 months ago
Differentiation and Interaction of Traffic: A Flow Level Study
We study what kind of differentiation can be achieved using DiffServ without admission control and using a relative services approach, i.e. the rate of the flow should be in propor...
Eeva Nyberg, Samuli Aalto
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 1 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
BPM
2008
Springer
207views Business» more  BPM 2008»
15 years 1 months ago
From Personal Task Management to End-User Driven Business Process Modeling
The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...
CIKM
2008
Springer
15 years 1 months ago
Towards a model of understanding social search
Search engine researchers typically depict search as the solitary activity of an individual searcher. In contrast, results from our critical-incident survey of 150 users on Amazon...
Brynn M. Evans, Ed H. Chi