Sciweavers

2562 search results - page 248 / 513
» An Internet without the Internet protocol
Sort
View
USS
2008
15 years 6 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
IS
2007
15 years 4 months ago
Aldat: A retrospective on a work in progress
level of abstraction which is not only ideally suited for processing data on secondary storage but which also readily absorbs important issues in computational parallelism and in d...
T. H. Merrett
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 11 months ago
Universal Metadata Standard
The basis of consciousness is an association of notions, the neuronal network. Similarly, the creation of a next generation internet (semantic web) is impossible without attributes...
Andrej Poleev
ACMACE
2006
ACM
15 years 10 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 4 months ago
Clustering and Sharing Incentives in BitTorrent Systems
Peer-to-peer protocols play an increasingly instrumental role in Internet content distribution. It is therefore important to gain a complete understanding of how these protocols b...
Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixi...