Sciweavers

3815 search results - page 195 / 763
» An Implementation of Session Types
Sort
View
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 2 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
AIMSA
2008
Springer
14 years 2 months ago
Tailoring the Interpretation of Spatial Utterances for Playing a Board Game
In order to build an intelligent system that allows human beings to cooperate with a computing machine to perform a given task it is important to account for the individual charact...
Andrea Corradini
DSN
2007
IEEE
14 years 2 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 2 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
ECOWS
2007
Springer
14 years 2 months ago
Composing Services with JOLIE
Service composition and service statefulness are key concepts in Web Service system programming. In this paper we present JOLIE, which is the full implementation of our formal cal...
Fabrizio Montesi, Claudio Guidi, Gianluigi Zavatta...