Sciweavers

1102 search results - page 113 / 221
» Distributed Key Generation for the Internet
Sort
View
111
Voted
IC
2003
15 years 4 months ago
Denying Denial-of-Service Attacks: A Router Based Solution
Distributed Denial-of-Service (DDoS) attacks prevent users from accessing services on the target network by flooding the target network with a large volume of traffic. In this pap...
Zhang Shu, Partha Dasgupta
168
Voted
SMARTNET
2000
15 years 4 months ago
MobiliTools: An OMG Standards-Based Toolbox for Agent Mobility and Interoperability
: One of the keys to success for applications of mobile and/or intelligent agents in large-scale open systems such as Internet is the ability of heterogeneous agents to cooperate a...
Bruno Dillenseger
134
Voted
IDA
2007
Springer
15 years 2 months ago
WWW traffic measure and its properties
Abstract. We present a method to extract a time series (Number of Active Requests (NAR)) from web cache logs which serves as a transport level measurement of internet traffic. This...
Marcus R. Keogh-Brown, Barbara Bogacka
145
Voted
WWW
2010
ACM
15 years 9 months ago
Entity relation discovery from web tables and links
The World-Wide Web consists not only of a huge number of unstructured texts, but also a vast amount of valuable structured data. Web tables [2] are a typical type of structured in...
Cindy Xide Lin, Bo Zhao, Tim Weninger, Jiawei Han,...
110
Voted
ICCD
2002
IEEE
115views Hardware» more  ICCD 2002»
15 years 11 months ago
Low-Power, High-Speed CMOS VLSI Design
Ubiquitous computing is a next generation information technology where computers and communications will be scaled further, merged together, and materialized in consumer applicati...
Tadahiro Kuroda