Sciweavers

2009 search results - page 211 / 402
» Towards Self-Configuring Networks
Sort
View
132
Voted
ECIS
2004
15 years 6 months ago
Inter-organizational knowledge management systems: typology and cases
Although companies are more and more developing complex networks of connections with their partners and customers and shifting their focus towards expanding the knowledge manageme...
Kostas Kafentzis, Dimitris Apostolou, Gregoris Men...
SIGCOMM
2010
ACM
15 years 5 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
CJ
2004
99views more  CJ 2004»
15 years 5 months ago
Filters for XML-based Service Discovery in Pervasive Computing
Pervasive computing refers to an emerging trend towards numerous casually accessible devices connected to an increasingly ubiquitous network infrastructure. An important challenge...
Georgia Koloniari, Evaggelia Pitoura
WWW
2005
ACM
16 years 5 months ago
WAND: a meta-data maintenance system over the internet
WAND is a meta-data management system that provides a file-system tree for users of an internet based P2P network. The tree is robust and retains its structure even when nodes (pe...
Anubhav Bhatia, Saikat Mukherjee, Saugat Mitra, Sr...
130
Voted
AIMS
2009
Springer
15 years 11 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras