Sciweavers

518 search results - page 20 / 104
» Client Side Personalization
Sort
View
TRUSTBUS
2005
Springer
14 years 1 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...
AINA
2003
IEEE
14 years 28 days ago
Server Scheduling Scheme for Asynchronous Cluster Video Server
In this paper, we propose an asynchronous cluster video server architecture, which is quite different from synchronous video server architecture in various aspects such as stripin...
Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han
DOA
2001
97views more  DOA 2001»
13 years 9 months ago
Transparent Dynamic Reconfiguration for CORBA
Distributed systems with high availability requirements have to support some form of dynamic reconfiguration. This means that they must provide the ability to be maintained or upg...
João Paulo A. Almeida, Maarten Wegdam, Mart...
MMS
2006
13 years 7 months ago
Update Relevance under the Multiset Semantics of RDBMS
: In order to reduce transmission costs and response time, mobile clients typically cache data locally. But, avoiding the usage of outdated data and maintaining the consistency of ...
Hagen Höpfner
CN
1999
56views more  CN 1999»
13 years 7 months ago
Surfing the Web Backwards
From a user's perspective, hypertext links on the web form a directed graph between distinct information sources. We investigate the effects of discovering "backlinks&qu...
Soumen Chakrabarti, David Gibson, Kevin S. McCurle...