Sciweavers

491 search results - page 98 / 99
» Touch proxy interaction
Sort
View
SAC
2006
ACM
15 years 3 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
MOBIHOC
2000
ACM
15 years 1 months ago
Low power rendezvous in embedded wireless networks
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...
Terry Todd, Frazer Bennett, Alan Jones
ACSAC
2004
IEEE
15 years 1 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh
AGENTS
2001
Springer
15 years 1 months ago
Wasp nests for self-configurable factories
Agent-based approaches to manufacturing scheduling and control have gained increasing attention in recent years. Such approaches are attractive because they o er increased robustn...
Vincent A. Cicirello, Stephen F. Smith
84
Voted
VLC
2002
153views more  VLC 2002»
14 years 9 months ago
An XML-based Quality of Service Enabling Language for the Web
In this paper, we introduce an XML-based Hierarchical QoS Markup Language, called HQML, to enhance distributed multimedia applications on the World Wide Web (WWW) with Quality of ...
Xiaohui Gu, Klara Nahrstedt, Wanghong Yuan, Duangd...