Sciweavers

274 search results - page 10 / 55
» The Design, Implementation and Operation of an Email Pseudon...
Sort
View
103
Voted
USS
2010
14 years 9 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
WORDS
2002
IEEE
15 years 4 months ago
Service Differentiation of Communication-bound Processes in a Real-Time Operating System
The majority of today’s Internet-based services are generally not concerned about the level of Quality of Service (QoS) presented to their users. For many such services, however...
Domenico Cotroneo, Massimo Ficco, Mauro Gargiulo, ...
92
Voted
LISA
2001
15 years 1 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
90
Voted
FAST
2010
15 years 2 months ago
Evaluating Performance and Energy in File System Server Workloads
Recently, power has emerged as a critical factor in designing components of storage systems, especially for power-hungry data centers. While there is some research into power-awar...
Priya Sehgal, Vasily Tarasov, Erez Zadok
ISCOPE
1997
Springer
15 years 3 months ago
Client/Server Architecture in the ADAMS Parallel Object-Oriented Database System
This paper describes issues encountered in the design and implementation of a parallel object-oriented database system. In particular, we find that the design of a client/server ...
Russell F. Haddleton, John L. Pfaltz