Sciweavers

1386 search results - page 165 / 278
» Challenges to information systems: time to change
Sort
View
ITCC
2005
IEEE
15 years 3 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
IAAI
2001
14 years 11 months ago
TALPS: The T-AVB Automated Load Planning System
Due to military drawdowns and the need for additional transportation lift requirements, the US MARINE CORPS developed a concept wherein they had modified a commercial container sh...
Paul S. Cerkez
ICFP
2009
ACM
15 years 10 months ago
Identifying query incompatibilities with evolving XML schemas
During the life cycle of an XML application, both schemas and queries may change from one version to another. Schema evolutions may affect query results and potentially the validi...
Nabil Layaïda, Pierre Genevès, Vincent...
IEEEIAS
2008
IEEE
15 years 4 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
EUROSYS
2007
ACM
15 years 7 months ago
Exploiting nonstationarity for performance prediction
Real production applications ranging from enterprise applications to large e-commerce sites share a crucial but seldom-noted characteristic: The relative frequencies of transactio...
Christopher Stewart, Terence Kelly, Alex Zhang