Sciweavers

4286 search results - page 788 / 858
» Formalizing Service Interactions
Sort
View
137
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
16 years 21 days ago
You are who you know: Inferring user profiles in Online Social Networks
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...
111
Voted
ICDCS
2009
IEEE
16 years 14 days ago
File Versioning for Block-Level Continuous Data Protection
Block-level continuous data protection (CDP) logs every disk block update so that disk updates within a time window are undoable. Standard file servers and DBMS servers can enjoy...
Maohua Lu, Tzi-cker Chiueh
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 10 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
143
Voted
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 10 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic