Sciweavers

232 search results - page 26 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
SIGCOMM
2005
ACM
14 years 3 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
IUSED
2008
13 years 11 months ago
Designing Usable Applications based on Web Services
One trend in software development is to implement application functionalities through Web services. This eases the possibility of developing interactive applications exploiting fu...
Fabio Paternò, Carmen Santoro, Lucio Davide...
ESSOS
2011
Springer
13 years 1 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
CHI
2011
ACM
13 years 1 months ago
SandCanvas: a multi-touch art medium inspired by sand animation
Sand animation is a performance art technique in which an artist tells stories by creating animated images with sand. Inspired by this medium, we have developed a new multitouch d...
Rubaiat Habib Kazi, Kien Chuan Chua, Shengdong Zha...
CIKM
2010
Springer
13 years 8 months ago
Fast and accurate estimation of shortest paths in large graphs
Computing shortest paths between two given nodes is a fundamental operation over graphs, but known to be nontrivial over large disk-resident instances of graph data. While a numbe...
Andrey Gubichev, Srikanta J. Bedathur, Stephan Seu...