Sciweavers

3090 search results - page 555 / 618
» On Testing Answer-Set Programs
Sort
View
131
Voted
TON
2010
210views more  TON 2010»
14 years 8 months ago
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
Abstract-- Security issues and attack management in transparent WDM (Wavelength Division Multiplexing) optical networks has become of prime importance to network operators due to t...
Nina Skorin-Kapov, J. Chen, Lena Wosinska
APSEC
2010
IEEE
14 years 5 months ago
Evaluating Cloud Platform Architecture with the CARE Framework
There is an emergence of cloud application platforms such as Microsoft’s Azure, Google’s App Engine and Amazon’s EC2/SimpleDB/S3. Startups and Enterprise alike, lured by the...
Liang Zhao, Anna Liu, Jacky Keung
151
Voted
ISSTA
2012
ACM
13 years 4 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
WWW
2003
ACM
16 years 2 months ago
Efficient URL caching for world wide web crawling
Crawling the web is deceptively simple: the basic algorithm is (a) Fetch a page (b) Parse it to extract all linked URLs (c) For all the URLs not seen before, repeat (a)?(c). Howev...
Andrei Z. Broder, Marc Najork, Janet L. Wiener
139
Voted
VCIP
2000
128views Communications» more  VCIP 2000»
15 years 3 months ago
Video Quality Experts Group: current results and future directions
Subjective assessment methods have been used reliably for many years to evaluate video quality. They continue to provide the most reliable assessments compared to objective method...
Ann M. Rohaly, Philip J. Corriveau, John M. Libert...