Sciweavers

823 search results - page 157 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
The Cache Inference Problem and its Application to Content and Request Routing
— In many networked applications, independent caching agents cooperate by servicing each other’s miss streams, without revealing the operational details of the caching mechanis...
Nikolaos Laoutaris, Georgios Zervas, Azer Bestavro...
INFOCOM
2006
IEEE
14 years 1 months ago
Generalized Proportional Fair Scheduling in Third Generation Wireless Data Networks
—In 3G data networks, network operators would like to balance system throughput while serving users in a fair manner. This is achieved using the notion of proportional fairness. ...
Tian Bu, L. Li, Ramachandran Ramjee
TKDE
2010
197views more  TKDE 2010»
13 years 2 months ago
Filtering Data Streams for Entity-Based Continuous Queries
The idea of allowing query users to relax their correctness requirements in order to improve performance of a data stream management system (e.g., location-based services and senso...
Reynold Cheng, Benjamin C. M. Kao, Alan Kwan, Suni...
CCS
2007
ACM
14 years 2 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
INFOCOM
2009
IEEE
14 years 2 months ago
FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale
—It has been widely acknowledged that online storage systems within the “cloud” of the Internet provide services of a substantial value to end users who wish to share files ...
Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zh...