Sciweavers

3047 search results - page 305 / 610
» A Secure Distributed Search System
Sort
View
AGENTS
2001
Springer
15 years 9 months ago
Implementing soft real-time agent control
Real-time control has become increasingly important as technologies are moved from the lab into real world situations. The complexity associated with these systems increases as co...
Régis Vincent, Bryan Horling, Victor R. Les...
JODL
2000
201views more  JODL 2000»
15 years 4 months ago
A transaction log analysis of a digital library
As experimental digital library testbeds gain wider acceptance and develop significant user bases, it becomes important to investigate the ways in which users interact with the sy...
Steve Jones, Sally Jo Cunningham, Rodger J. McNab,...
LAWEB
2008
IEEE
15 years 11 months ago
(Query) History Teaches Everything, Including the Future
“History Teaches Everything, Including the Future”, wrote Alphonse de Lamartine in the nineteen century. Even if history cannot be really considered a predictive science, hist...
Fabrizio Silvestri, Ranieri Baraglia, Claudio Lucc...
ACSAC
2006
IEEE
15 years 10 months ago
A Framework for a Collaborative DDoS Defense
Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distr...
George C. Oikonomou, Jelena Mirkovic, Peter L. Rei...
140
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross