Sciweavers

595 search results - page 7 / 119
» Session 7: Demonstrations
Sort
View
ESORICS
2009
Springer
15 years 10 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
PKDD
2004
Springer
199views Data Mining» more  PKDD 2004»
15 years 2 months ago
SemanticTalk: Software for Visualizing Brainstorming Sessions and Thematic Concept Trails on Document Collections
Abstract: In this demonstration we introduce a technology to support knowledge structuring processes already at the time of their creation by building up concept structures in real...
Christian Biemann, Karsten Böhm, Gerhard Heye...
COMPUTER
2008
86views more  COMPUTER 2008»
14 years 9 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
ICMCS
2000
IEEE
102views Multimedia» more  ICMCS 2000»
15 years 2 months ago
Trader's Quality of Service Specifications and Effects on System Performance for Video-on-Demand
In this paper we present a detailed review on the Trader’s Quality of Service (QoS) Specifications and the Effects on System Performance for Video-on-Demand Multimedia (MM) Appl...
Edward Babulak
EDBT
2000
ACM
15 years 1 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...