Sciweavers

2200 search results - page 276 / 440
» Hop Integrity in Computer Networks
Sort
View
135
Voted
ICDCSW
2002
IEEE
15 years 8 months ago
Hermes: A Distributed Event-Based Middleware Architecture
In this paper, we argue that there is a need for an event-based middleware to build large-scale distributed systems. Existing publish/subscribe systems still have limitations comp...
Peter R. Pietzuch, Jean Bacon
153
Voted
NDSS
1999
IEEE
15 years 8 months ago
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...
Andreu Riera, Joan Borrell
126
Voted
ICCAD
1993
IEEE
134views Hardware» more  ICCAD 1993»
15 years 7 months ago
Beyond the combinatorial limit in depth minimization for LUT-based FPGA designs
In this paper, we present an integrated approach to synthesis and mapping to go beyond the combinatorial limit set up by the depth-optimal FlowMap algorithm. The new algorithm, na...
Jason Cong, Yuzheng Ding
133
Voted
AINA
2010
IEEE
15 years 7 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
149
Voted
CONEXT
2007
ACM
15 years 5 months ago
Extending web browsers architectures to support HTTP session mobility
In a bid to extend web browsers capabilities, a new extension that transfers HTTP session between two web browsers also knows as User Agents will be developed. The capabilities of...
Michael O. Adeyeye, Neco Ventura