Sciweavers

16702 search results - page 67 / 3341
» Server operating systems
Sort
View
91
Voted
USS
2008
15 years 6 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
120
Voted
ERSA
2004
101views Hardware» more  ERSA 2004»
15 years 5 months ago
Embedded Linux as a Platform for Dynamically Self-Reconfiguring Systems-on-Chip
- We have previously argued the benefits of embedded Linux as an operating system platform for reconfigurable system-on-chip design. In this paper we describe our approach building...
John W. Williams, Neil W. Bergmann
119
Voted
APNOMS
2006
Springer
15 years 7 months ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu
132
Voted
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Comparison of Distributed Groupware Implementation Environments
This paper compares popular client and server architectures used for groupware. It presents a client framework and evaluates native, installed clients, Java-based applications, an...
Conan C. Albrecht
209
Voted
WMCSA
2000
IEEE
15 years 8 months ago
ARC: A Bottom-Up Approach to Negotiated QoS
Mobile systems operate in a resource-scarce environment and thus must adapt to external conditions; all layers must make cost-based decisions about what mode of operation to use i...
Hylke W. van Dijk, Koen Langendoen, Henk J. Sips