Sciweavers

2058 search results - page 341 / 412
» Concast: Design and Implementation of a New Network Service
Sort
View
EUROSYS
2009
ACM
15 years 9 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
JPDC
2006
253views more  JPDC 2006»
14 years 11 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
NSDI
2007
15 years 2 months ago
The Flexlab Approach to Realistic Evaluation of Networked Systems
Networked systems are often evaluated on overlay testbeds such as PlanetLab and emulation testbeds such as Emulab. Emulation testbeds give users great control over the host and ne...
Robert Ricci, Jonathon Duerig, Pramod Sanaga, Dani...
BIS
2008
174views Business» more  BIS 2008»
15 years 1 months ago
Hubbub - An Innovative Customer Support Forum
Internet user forums have been proven to be effective not just as a community meeting place but also as a supporting tool for various business products. Traditional forums are desi...
Duong Nguyen, Simon Thompson, Cefn Hoile
SOSP
2007
ACM
15 years 8 months ago
Dynamo: amazon's highly available key-value store
Reliability at massive scale is one of the biggest challenges we face at Amazon.com, one of the largest e-commerce operations in the world; even the slightest outage has significa...
Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, ...