Sciweavers

1642 search results - page 263 / 329
» Systemic Service Design: Aligning Value and Implementation
Sort
View
ISSA
2004
15 years 1 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
PKDD
2005
Springer
136views Data Mining» more  PKDD 2005»
15 years 5 months ago
Weka4WS: A WSRF-Enabled Weka Toolkit for Distributed Data Mining on Grids
This paper presents Weka4WS, a framework that extends the Weka toolkit for supporting distributed data mining on Grid environments. Weka4WS adopts the emerging Web Services Resourc...
Domenico Talia, Paolo Trunfio, Oreste Verta
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 6 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
WIDM
2006
ACM
15 years 5 months ago
An architecture for creating collaborative semantically capable scientific data sharing infrastructures
Increasingly, scientists are seeking to collaborate and share data among themselves. Such sharing is can be readily done by publishing data on the World-Wide Web. Meaningful query...
Anuj R. Jaiswal, C. Lee Giles, Prasenjit Mitra, Ja...
CCGRID
2003
IEEE
15 years 5 months ago
Supporting Peer-to-Peer Computing with FlexiNet
Formation of suitable overlay-network topologies that are able to reflect the structure of the underlying network-infrastructure, has rarely been addressed by peer-to-peer applic...
Thomas Fuhrmann