We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
In application server systems, such as J2EE, replication is an essential strategy for reliability and efficiency. Many J2EE implementations, both commercial and open-source, provid...
— When considering network restoration, the amount of reserved resources has an important impact on network performance in that it can restrict the acceptance of new connections....
Moving range queries over mobile objects are important in many location management applications. There have been quite a few research works in this area. However, all existing solu...