Sciweavers

209 search results - page 20 / 42
» Evaluating the performance of user-space and kernel-space we...
Sort
View
CCS
2011
ACM
13 years 9 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
80
Voted
CN
2008
111views more  CN 2008»
14 years 9 months ago
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms
Overload control mechanisms such as admission control and connection differentiation have proven effective for preventing overload of application servers running secure web applic...
Jordi Guitart, David Carrera, Vicenç Beltra...
ICWS
2009
IEEE
15 years 6 months ago
Adaptive Prefetching Scheme Using Web Log Mining in Cluster-Based Web Systems
The main memory management has been a critical issue to provide high performance in web cluster systems. To overcome the speed gap between processors and disks, many prefetch sche...
Heung Ki Lee, Baik Song An, Eun Jung Kim
CCS
2010
ACM
14 years 8 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
EUROPAR
2006
Springer
15 years 1 months ago
DOH: A Content Delivery Peer-to-Peer Network
Many SMEs and non-profit organizations suffer when their Web servers become unavailable due to flash crowd effects when their web site becomes popular. One of the solutions to the ...
Jimmy Jernberg, Vladimir Vlassov, Ali Ghodsi, Seif...