Sciweavers

1524 search results - page 265 / 305
» Computing effective communication policies in multiagent sys...
Sort
View
CCS
2008
ACM
15 years 4 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
ICITA
2005
IEEE
15 years 7 months ago
WiFiAdmin: An Intelligent Web-Based Management Environment for Wireless Networks
Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution...
Eythimios Dimopoulos, Athanasios Panousis, Evangel...
ICN
2005
Springer
15 years 7 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
ISPDC
2003
IEEE
15 years 7 months ago
Lightweight Logging and Recovery for Distributed Shared Memory over Virtual Interface Architecture
As software Distributed Shared Memory(DSM) systems become attractive on larger clusters, the focus of attention moves toward improving the reliability of systems. In this paper, w...
Soyeon Park, Youngjae Kim, Seung Ryoul Maeng
HIPEAC
2009
Springer
15 years 5 months ago
Deriving Efficient Data Movement from Decoupled Access/Execute Specifications
Abstract. On multi-core architectures with software-managed memories, effectively orchestrating data movement is essential to performance, but is tedious and error-prone. In this p...
Lee W. Howes, Anton Lokhmotov, Alastair F. Donalds...