Sciweavers

16 search results - page 1 / 4
» How to Steal a Botnet and What Can Happen When You Do
Sort
View
PADS
1997
ACM
13 years 9 months ago
The Dark Side of Risk (what your mother never told you about Time Warp)
This paper is a reminder of the danger of allowing \risk" when synchronizing a parallel discrete-event simulation: a simulation code that runs correctly on a serial machine m...
David M. Nicol, X. Liu

Lecture Notes
4961views
15 years 2 months ago
The Relational Data Model, Normalisation and effective Database Design
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
Tony Marston
MC
2003
170views Computer Science» more  MC 2003»
13 years 6 months ago
Social navigation: from the web to the mobile
Social navigation is the alternative way of looking upon navigation in the virtual world: e g instead of navigating the web by maps and hierarchies and search engines, you would n...
Kristina Höök
MOZ
2004
Springer
13 years 10 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro