Sciweavers

1444 search results - page 80 / 289
» The end of users
Sort
View
EDOC
2002
IEEE
15 years 2 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
IH
2010
Springer
14 years 7 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright
ATAL
2003
Springer
15 years 1 months ago
Using web helper agent profiles in query generation
Personalized information agents can help overcome some of the limitations of communal Web information sources such as portals and search engines. Two important components of these...
Gabriel Somlo, Adele E. Howe
MOBICOM
1999
ACM
15 years 2 months ago
An Architecture for a Secure Service Discovery Service
The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting ...
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, ...
WINET
2002
138views more  WINET 2002»
14 years 9 months ago
An Architecture for Secure Wide-Area Service Discovery
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...