Sciweavers

690 search results - page 64 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
UIST
2003
ACM
15 years 9 months ago
Rhythm modeling, visualizations and applications
People use their awareness of others' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling t...
James Begole, John C. Tang, Rosco Hill
ACSW
2007
15 years 5 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...
ERLANG
2006
ACM
15 years 10 months ago
From HTTP to HTML: Erlang/OTP experiences in web based service applications
This paper describes the lessons learnt when internally developing web applications in Erlang. On the basis of these experiences, a framework called the Web Platform has been impl...
Francesco Cesarini, Lukas Larsson, Michal Slaski
IPPS
2010
IEEE
15 years 1 months ago
Scalable multi-pipeline architecture for high performance multi-pattern string matching
Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed deep packet inspection (DPI). Although Aho...
Weirong Jiang, Yi-Hua Edward Yang, Viktor K. Prasa...
123
Voted
ECRIME
2007
15 years 7 months ago
Examining the impact of website take-down on phishing
Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraud...
Tyler Moore, Richard Clayton