Sciweavers

537 search results - page 106 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
DCC
2004
IEEE
13 years 11 months ago
Adaptive Rate Control Scheme for Video Streaming Over Wireless Channels
Providing continuous video playback with graceful quality degradation over wireless channels is fraught with challenges. Video applications require stringent delay guarantees and ...
Marwan Krunz, Mohamed Hassan
CCS
2008
ACM
13 years 9 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
DIM
2008
ACM
13 years 8 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
SIGCOMM
2010
ACM
13 years 7 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
BMCBI
2010
193views more  BMCBI 2010»
13 years 7 months ago
caGrid Workflow Toolkit: A Taverna based workflow tool for cancer Grid
Background: In biological and medical domain, the use of web services made the data and computation functionality accessible in a unified manner, which helped automate the data pi...
Wei Tan, Ravi K. Madduri, Aleksandra Nenadic, Stia...