Sciweavers

1222 search results - page 98 / 245
» Verifying a File System Implementation
Sort
View
109
Voted
RAID
1999
Springer
15 years 6 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
WWW
2003
ACM
16 years 3 months ago
Techniques and Metrics for Improving Website Structure
In this work two distinct metrics are proposed, which aim to quantify the importance of a web page based on the visits it receives by the users and its location within the website...
Eleni Christopoulou, John D. Garofalakis, Christos...
125
Voted
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 9 months ago
Scalable Maintenance for Strong Web Consistency in Dynamic Content Delivery Overlays
— Content Delivery Overlays improves end-user performance by replicating Web contents on a group of geographically distributed sites interconnected over the Internet. However, wi...
Zhou Su, Jiro Katto, Yasuhiko Yasuda
110
Voted
ICAS
2005
IEEE
85views Robotics» more  ICAS 2005»
15 years 8 months ago
Supporting Consistency Management in Dynamic Content Distribution Overlays
Content Distribution Overlays improves end-user performance by replicating Web contents on a group of geographically distributed sites interconnected over the Internet. However, w...
Zhou Su, Jiro Katto, Yasuhiko Yasuda
128
Voted
AAAI
2006
15 years 4 months ago
Automatically Labeling the Inputs and Outputs of Web Services
Information integration systems combine data from multiple heterogeneous Web services to answer complex user queries, provided a user has semantically modeled the service first. T...
Kristina Lerman, Anon Plangprasopchok, Craig A. Kn...