Sciweavers

673 search results - page 3 / 135
» Request behavior variations
Sort
View
COMGEO
2011
ACM
12 years 9 months ago
What to do with 500M location requests a day?
Skyhook Wireless provides hybrid positioning to millions of mobile devices around the world. Using an approach that integrates cell, WiFi, and GPS signals, the system services ove...
Kipp Jones, Richard Sutton
CCS
2008
ACM
13 years 8 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
INFOCOM
2008
IEEE
14 years 20 days ago
Dynamic Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access Networks
—The emerging broadband wireless access (BWA) technology based on IEEE 802.16 is one of the most promising solutions to provide ubiquitous wireless access to the broadband servic...
Eun-Chan Park, Hwangnam Kim, Jae-Young Kim, Han Se...
WIOPT
2005
IEEE
13 years 12 months ago
A New Hybrid Scheduling Framework for Asymmetric Wireless Environments with Request Repetition
Abstract— The ever-increasing popularity of web services, growing demand for wireless multimedia and introduction of new, feature-enhanced, hand-held devices has already given bi...
Navrati Saxena, Maria Cristina Pinotti, Kalyan Bas...
ISQED
2007
IEEE
182views Hardware» more  ISQED 2007»
14 years 16 days ago
Defect or Variation? Characterizing Standard Cell Behavior at 90nm and below
Historically, design margin and defects have been viewed as different topics, one part of design and the other part of test. Shrinking process geometries are making the two part o...
Robert C. Aitken