Sciweavers

10396 search results - page 2010 / 2080
» Testing Web Applications
Sort
View
ESORICS
2007
Springer
15 years 4 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
ESWS
2007
Springer
15 years 4 months ago
Understanding Large Volumes of Interconnected Individuals by Visual Exploration
Abstract. Ontologies are now used within an increasing number of realworld applications. So far, significant effort has been spend in building tools to support users in creating,...
Olaf Noppens, Thorsten Liebig
GRID
2007
Springer
15 years 4 months ago
Eliciting honest value information in a batch-queue environment
Abstract— Markets and auctions have been proposed as mechanisms for efficiently and fairly allocating resources in a number of different computational settings. Economic approac...
Andrew Mutz, Richard Wolski, John Brevik
IPSN
2007
Springer
15 years 4 months ago
Beacon location service: a location service for point-to-point routing in wireless sensor networks
In this paper we present Beacon Location Service (BLS): a location service for beacon-based routing algorithms like Beacon Vector Routing (BVR) [8] and S4 [19] . The role of a loc...
Jorge Ortiz, Chris R. Baker, Daekyeong Moon, Rodri...
ISI
2007
Springer
15 years 4 months ago
Mining Higher-Order Association Rules from Distributed Named Entity Databases
The burgeoning amount of textual data in distributed sources combined with the obstacles involved in creating and maintaining central repositories motivates the need for effective ...
Shenzhi Li, Christopher D. Janneck, Aditya P. Bela...
« Prev « First page 2010 / 2080 Last » Next »