Sciweavers

483 search results - page 49 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
225
Voted
POPL
2005
ACM
16 years 3 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
HPDC
2008
IEEE
15 years 10 months ago
Ontological framework for a free-form query based grid search engine
If the model of free-form queries, which has proved successful for HTML based search on the Web, is made available for Grid services, it will serve as a powerful tool for scientis...
Chaitali Gupta, Rajdeep Bhowmik, Madhusudhan Govin...
JWSR
2007
83views more  JWSR 2007»
15 years 3 months ago
Web Service Discovery and Composition for Virtual Enterprises
: One main characteristic of virtual enterprises are short-term collaborations between business partners to provide efficient and individualized services to customers. The MOVE pro...
Jürgen Dorn, Peter Hrastnik, Albert Rainer
CCS
2009
ACM
15 years 10 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
103
Voted
ENVSOFT
2006
76views more  ENVSOFT 2006»
15 years 3 months ago
LQGraph: A software package for optimizing connectivity in conservation planning
LQGraph implements methods for optimizing the connectivity of sites administered to protect biodiversity (a conservation area network). The methods are suitable for existing prote...
Trevon Fuller, Sahotra Sarkar