Sciweavers

635 search results - page 121 / 127
» Automatic Discovery of Network Applications: A Hybrid Approa...
Sort
View
DIM
2008
ACM
13 years 8 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
WOSP
1998
ACM
13 years 11 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...
SACMAT
2010
ACM
14 years 12 days ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SIGSOFT
2007
ACM
14 years 8 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
ATAL
2005
Springer
14 years 1 months ago
An adaptive solution to dynamic transport optimization
This paper describes LS/ATN, Living Systems R Adaptive Transportation Networks, an agent-based solution we have developed to solve transportation problems in the charter business ...
Klaus Dorer, Monique Calisti