Sciweavers

511 search results - page 73 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
ACSAC
2002
IEEE
15 years 8 months ago
GOSSIB vs. IP Traceback Rumors
Abstract—To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking ...
Marcel Waldvogel
139
Voted
ACSC
2003
IEEE
15 years 9 months ago
Context-Sensitive Mobile Database Summarisation
In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, ...
Darin Chan, John F. Roddick
128
Voted
ESE
2006
97views Database» more  ESE 2006»
15 years 3 months ago
An empirical study of fine-grained software modifications
Software is typically improved and modified in small increments (we refer to each of these increments as a modification record--MR). MRs are usually stored in a configuration manag...
Daniel M. Germán
WWW
2009
ACM
16 years 4 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
135
Voted
ECIS
2003
15 years 5 months ago
Assessing the performance of an electronic marketplace: a conceptual model and case study
Theories of inter-organisational co-ordination propose that information processing capabilities (structure, process and technology) must be aligned with information processing nee...
Philip O'Reilly, Pat Finnegan