Sciweavers

2494 search results - page 292 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
CCS
2005
ACM
14 years 1 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
WEBDB
2004
Springer
100views Database» more  WEBDB 2004»
14 years 1 months ago
Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages
The increasing importance of search engines to commercial web sites has given rise to a phenomenon we call “web spam”, that is, web pages that exist only to mislead search eng...
Dennis Fetterly, Mark Manasse, Marc Najork
WWW
2009
ACM
14 years 9 months ago
REST-based management of loosely coupled services
Applications increasingly make use of the distributed platform that the World Wide Web provides ? be it as a Software-as-a-Service such as salesforce.com, an application infrastru...
Heiko Ludwig, Jim Laredo, Kamal Bhattacharya, Lili...
ICDCS
2002
IEEE
14 years 1 months ago
Query Optimization to Meet Performance Targets for Wide Area Applications
Recent technology advances have enabled mediated query processing with Internet accessible WebSources. A characteristic of WebSources is that their access costs exhibit transient ...
Vladimir Zadorozhny, Louiqa Raschid
ISORC
1999
IEEE
14 years 18 days ago
An Object-level Gateway Supporting Integrated-Property Quality of Service
As networks and the use of communication within applications continue to grow and find more uses, so too does the demand for more control and manageability of various "system...
Richard E. Schantz, John A. Zinky, David A. Karr, ...