Sciweavers

237 search results - page 17 / 48
» Adaptive Systems Require Adaptive Support--When Tools Attack...
Sort
View
HICSS
1995
IEEE
145views Biometrics» more  HICSS 1995»
13 years 11 months ago
Coordination breakdowns: why groupware is so difficult to design
The complexity of group interaction means that there will be many uncertainties in the requirements for software support tools. Many existing software systems rely on the adaptabi...
Steve M. Easterbrook
IADIS
2004
13 years 9 months ago
A quality of service aware Web server
This paper addresses two questions. Firstly, how is it possible for an application to become aware of network conditions and secondly, given this awareness, how can a system be de...
Kristoffer Getchell, Martin Bateman, Colin Allison...
JSAC
2006
165views more  JSAC 2006»
13 years 7 months ago
ALPi: A DDoS Defense System for High-Speed Networks
Distributed denial-of-service (DDoS) attacks pose a significant threat to the Internet. Most solutions proposed to-date face scalability problems as the size and speed of the netwo...
P. E. Ayres, H. Sun, H. Jonathan Chao, Wing Cheong...
EUROCRYPT
2009
Springer
14 years 8 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir
PERCOM
2006
ACM
14 years 7 months ago
Plan B: An Operating System for Ubiquitous Computing Environments
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...