Sciweavers

483 search results - page 51 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
145
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
Proof as Composition: An approach for the Large-granularity Web Services Composition
The large-granularity Web services are a new form of Web services. In contrast to the traditional Web services, they often have more interfaces, encapsulate more complex business ...
Yuyu Yin, Ying Li, Jianwei Yin, ShuiGuang Deng
126
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
98
Voted
WSCG
2001
83views more  WSCG 2001»
15 years 4 months ago
A Digital Teletext Service
Digital Teletext is one of the most important interactive services of emerging digital television. As an enhanced version of existing analogue Teletext service, it's a reside...
Chengyuan Peng, Petri Vuorimaa
163
Voted
IC
2004
15 years 5 months ago
Constructing Finite State Automata for High-Performance XML Web Services
This paper describes a validating XML parsing method based on deterministic finite state automata (DFA). XML parsing and validation is performed by a schema-specific XML parser th...
Robert van Engelen
135
Voted
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
15 years 7 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...