Sciweavers

479 search results - page 84 / 96
» cn 2008
Sort
View
CN
2004
122views more  CN 2004»
14 years 9 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
CN
2000
130views more  CN 2000»
14 years 9 months ago
Automating Web navigation with the WebVCR
Recent developments in Web technology such as the inclusion of scripting languages, frames, and the growth of dynamic content, have made the process of retrieving Web content more...
Vinod Anupam, Juliana Freire, Bharat Kumar, Daniel...
CN
2000
98views more  CN 2000»
14 years 9 months ago
Dynamic pricing by software agents
We envision a future in which the global economy and the Internet will merge and evolve together into an information economy bustling with billions of economically motivated softw...
Jeffrey O. Kephart, James E. Hanson, Amy R. Greenw...
CN
2000
114views more  CN 2000»
14 years 9 months ago
Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes
ATM networks are widely adopted as backbone networks. TCP/IP are the most popular protocols today and it is quite possible that packets are forwarded by ATM networks. In ATM netwo...
Wei Kuang Lai, Mu-Rung Shiu
CN
2000
95views more  CN 2000»
14 years 9 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...