Sciweavers

483 search results - page 40 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
138
Voted
ICDIM
2009
IEEE
15 years 10 months ago
A new hybrid schema-sharing technique for multitenant applications
This paper presents a new schema-sharing technique for multitenant applications. Our approach is built on top of the Extension table method and makes use of the native XML data su...
Franclin S. Foping, Ioannis M. Dokas, John Feehan,...
RTSS
2008
IEEE
15 years 10 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
15 years 8 months ago
Active knowledge: dynamically enriching RDF knowledge bases by web services
The proliferation of knowledge-sharing communities and the advances in information extraction have enabled the construction of large knowledge bases using the RDF data model to re...
Nicoleta Preda, Gjergji Kasneci, Fabian M. Suchane...
IEEESCC
2007
IEEE
15 years 9 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
DIMVA
2006
15 years 4 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...