Sciweavers

1757 search results - page 53 / 352
» Secure Content Validation
Sort
View
EUROPAR
2006
Springer
15 years 2 months ago
DOH: A Content Delivery Peer-to-Peer Network
Many SMEs and non-profit organizations suffer when their Web servers become unavailable due to flash crowd effects when their web site becomes popular. One of the solutions to the ...
Jimmy Jernberg, Vladimir Vlassov, Ali Ghodsi, Seif...
MASCOTS
2008
15 years 17 days ago
Modeling Software Contention using Colored Petri Nets
Commercial servers, such as database or application servers, often attempt to improve performance via multithreading. Improper multi-threading architectures can incur contention, ...
Nilabja Roy, Akshay Dabholkar, Nathan Hamm, Lawren...
ACSAC
2001
IEEE
15 years 2 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
ENTCS
2007
199views more  ENTCS 2007»
14 years 11 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
ICIP
2005
IEEE
16 years 24 days ago
Spatio-temporal attention model for video content analysis
This paper presents a new model of human attention that allows salient areas to be extracted from video frames. As automatic understanding of video semantic content is still far fr...
Mickael Guironnet, Nathalie Guyader, Denis Pelleri...