This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Currently, Grid technologies are widely used in largescale scientific applications. Grids support stateful interactions with explicit exposure of state information across the boun...
Sangmi Lee Pallickara, Beth Plale, Scott Jensen, Y...
The dominant technology for electronic communication and commerce, the telephone, does not discriminate between sighted and non-sighted users. The web does discriminate. The web i...