Sciweavers

680 search results - page 100 / 136
» Locating Hidden Servers
Sort
View
CGI
2006
IEEE
15 years 3 months ago
Providing Full Awareness to Distributed Virtual Environments Based on Peer-to-Peer Architectures
In recent years, large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multiplayer onl...
Pedro Morillo, W. Moncho, Juan M. Orduña, J...
ITNG
2006
IEEE
15 years 3 months ago
A Decentralized Network Coordinate System for Robust Internet Distance
Network distance, measured as round-trip latency between hosts, is important for the performance of many Internet applications. For example, nearest server selection and proximity...
Li-wei Lehman, Steven Lerman
NDSS
2006
IEEE
15 years 3 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
W4A
2006
ACM
15 years 3 months ago
Personalizable edge services for web accessibility
Web Content Accessibility guidelines by W3C [29] provide several suggestions for Web designers on how to author Web pages in order to make them accessible to everyone. In this con...
Gennaro Iaccarino, Delfina Malandrino, Vittorio Sc...
XIMEP
2006
ACM
194views Database» more  XIMEP 2006»
15 years 3 months ago
Template Folding for XPath
We discuss query evaluation for XML-based server systems where the same query is evaluated on every incoming XML message. In a typical scenario, many of the incoming messages will...
Carl-Christian Kanne, Guido Moerkotte