Sciweavers

20024 search results - page 3619 / 4005
» Database Management Systems
Sort
View
CCS
2011
ACM
14 years 4 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
CODASPY
2012
14 years 14 days ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
16 years 6 months ago
Efficient Query Subscription Processing in a Multicast Environment
Abstract Arturo Crespo, Orkut Buyukkokten, and Hector Garcia-Molina Stanford University With information dissemination (information push), data is delivered from a set of producers...
Arturo Crespo, Orkut Buyukkokten, Hector Garcia-Mo...

Publication
194views
17 years 3 months ago
A Survey of Application Layer Techniques for Adaptive Streaming of Multimedia
The current Internet only supports best-effort traffic. New high-speed technologies such as ATM (asynchronous transfer mode), gigabit Ethernet, fast Ethernet, and frame relay, have...
Bobby Vandalore, Wu-chi Feng, Raj Jain, Sonia Fahm...
209
Voted

Publication
233views
17 years 3 months ago
Design Considerations for the Virtual Source/Virtual Destination (VS/VD) Feature in the ABR Service of ATM Networks
The Available Bit Rate (ABR) service in ATM networks has been specified to allow fair and efficient support of data applications over ATM utilizing capacity left over after servici...
Shiv Kalyanaraman, Raj Jain, Jianping Jiang, Rohit...
« Prev « First page 3619 / 4005 Last » Next »