This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. According to Papazoglou et al., one challenge is to develop services...
Gregor Scheithauer, Konrad Voigt, Veli Bicer, Matt...
Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" comma...
Applications and digital goods for mobile devices have been around for more than a decade. Recent technology development has also driven the use of mobile commerce technology. Mob...
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...