Sciweavers

505 search results - page 89 / 101
» Accessible and Usable Internet System Design
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 3 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
EKAW
2000
Springer
15 years 3 months ago
What's in an Electronic Business Model?
An electronic business model is an important baseline for the development of e-commerce system applications. Essentially, it provides the design rationale for e-commerce systems fr...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
NSDI
2010
15 years 1 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman
IJIT
2004
15 years 1 months ago
An HCI Template for Distributed Applications
Both software applications and their development environment are becoming more and more distributed. This trend impacts not only the way software computes, but also how it looks. T...
Xizhi Li
IMC
2009
ACM
15 years 6 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...