Sciweavers

21 search results - page 1 / 5
» Session reports for SIGCOMM 2010
Sort
View
CCR
2011
12 years 11 months ago
Session reports for SIGCOMM 2010
This document collects together reports of the sessions from the 2010 ACM SIGCOMM Conference, the annual conference of the ACM Special Interest Group on Data Communication (SIGCOM...
Shailesh Agrawal, Kavitha Athota, Pramod Bhatotia,...
SIGMOD
2010
ACM
171views Database» more  SIGMOD 2010»
13 years 2 months ago
Report on the EDBT/ICDT 2010 workshop on updates in XML
The first international workshop on Updates in XML [1] was held in conjunction with the EDBT/ICDT conference in Lausanne (Switzerland) on March 22, 2010, and attracted approximat...
Michael Benedikt, Daniela Florescu, Philippa Gardn...
SIGCOMM
2010
ACM
13 years 4 months ago
Empowering users against sidejacking attacks
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to a web-based service. To prevent SideJacking, a se...
Ryan D. Riley, Nada Mohammed Ali, Kholoud Saleh Al...
SIGCOMM
2010
ACM
13 years 4 months ago
SIP overload control: a backpressure-based approach
Overload happens in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all messages they receive. Under overload, SIP networks suffe...
Yaogong Wang
SIGCOMM
2010
ACM
13 years 4 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long