Sciweavers

630 search results - page 84 / 126
» The Future Is Not Assured - But It Should Be
Sort
View
ER
2006
Springer
99views Database» more  ER 2006»
15 years 5 months ago
Ontology with Likeliness and Typicality of Objects in Concepts
Ontologies play an indispensable role in the Semantic Web by specifying the definitions of concepts and individual objects. However, most of the existing methods for constructing o...
Ching-man Au Yeung, Ho-fung Leung
EUC
2006
Springer
15 years 5 months ago
Impact of Node Cheating on Gossip-Based Protocol
Gossip-based protocol has been widely adopted by many large-scale multicast applications. In this paper, we study the impact of node cheating on decentralized gossip-based protocol...
Nan Zhang, Yuanchun Shi, Bin Chang
FSE
2006
Springer
137views Cryptology» more  FSE 2006»
15 years 5 months ago
A Study of the MD5 Attacks: Insights and Improvements
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wa...
John Black, Martin Cochran, Trevor Highland
GCC
2006
Springer
15 years 5 months ago
Decentralized Workflow Execution for Virtual Enterprises in Grid Environment
With the emergence of global market and virtual enterprises, coordination of business processes in dispersed organizations by distributed workflow execution will take on more impo...
Wei Tan, Yushun Fan
ACSAC
2001
IEEE
15 years 5 months ago
Requirements for a General Framework for Response to Distributed Denial-of-Service
What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can...
D. W. Gresty, Qi Shi, Madjid Merabti