Sciweavers

1440 search results - page 169 / 288
» Third-Party Flow Control
Sort
View
CCS
2008
ACM
15 years 7 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
DKE
2010
112views more  DKE 2010»
15 years 5 months ago
An integer programming based approach for verification and diagnosis of workflows
Workflow analysis is indispensable to capture modeling errors in workflow designs. While several workflow analysis approaches have been defined previously, these approaches do not...
Rik Eshuis, Akhil Kumar
ICC
2000
IEEE
124views Communications» more  ICC 2000»
15 years 9 months ago
A Fair Traffic Conditioner for the Assured Service in a Differentiated Services Internet
— A research issue under investigation in the context of differentiated services (DiffServ) is the fair distribution of bandwidth between aggregates sharing the same Assured Forw...
Ilias Andrikopoulos, Lloyd Wood, George Pavlou
MICRO
2000
IEEE
98views Hardware» more  MICRO 2000»
15 years 9 months ago
Efficient conditional operations for data-parallel architectures
Many data-parallel applications, including emerging media applications, have regular structures that can easily be expressed as a series of arithmetic kernels operating on data st...
Ujval J. Kapasi, William J. Dally, Scott Rixner, P...
LCN
1999
IEEE
15 years 9 months ago
An Intelligent Hub Protocol for Local Area Lightwave Networks
This paper presents a protocol for packet switched optical LANs using a star topology. The key element in this network is the use of an intelligent hub, which controls the traffic...
Dale Callahan, Gary J. Grimes