Sciweavers

641 search results - page 46 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
MOBICOM
1996
ACM
15 years 1 months ago
Building Reliable Mobile-Aware Applications Using the Rover Toolkit
This paper discusses extensions to the Rover toolkit for constructing reliable mobile-aware applications. The extensions improve upon the existing failure model, which only addres...
Anthony D. Joseph, M. Frans Kaashoek
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 3 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
89
Voted
ICAS
2006
IEEE
157views Robotics» more  ICAS 2006»
15 years 3 months ago
Adaptive provisioning using virtual machines and autonomous role-based management
A modern server system must deliver a complex set of obligations towards its users. We study the concept of roles as autonomous encapsulations of a set of promises. Using virtuali...
Kyrre M. Begnum, Mark Burgess, John A. Sechrest
P2P
2002
IEEE
178views Communications» more  P2P 2002»
15 years 2 months ago
A Scalable and Ontology-Based P2P Infrastructure for Semantic Web Services
Semantic Web Services are a promising combination of Semantic Web and Web service technology, aiming at providing means of automatically executing, discovering and composing seman...
Mario T. Schlosser, Michael Sintek, Stefan Decker,...
IJNSEC
2008
201views more  IJNSEC 2008»
14 years 9 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...