Sciweavers

509 search results - page 89 / 102
» End-to-End Web Application Security
Sort
View
ECOOP
2004
Springer
14 years 1 months ago
Finding and Removing Performance Bottlenecks in Large Systems
Abstract. Software systems obey the 80/20 rule: aggressively optimizing a vital few execution paths yields large speedups. However, finding the vital few paths can be difficult, e...
Glenn Ammons, Jong-Deok Choi, Manish Gupta, Nikhil...
CCS
2006
ACM
14 years 5 days ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
BROADNETS
2006
IEEE
14 years 2 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
ICDCS
2010
IEEE
13 years 9 months ago
Efficient Workstealing for Multicore Event-Driven Systems
Many high-performance communicating systems are designed using the event-driven paradigm. As multicore platforms are now pervasive, it becomes crucial for such systems to take adva...
Fabien Gaud, Sylvain Geneves, Renaud Lachaize, Bap...
SIGUCCS
2004
ACM
14 years 1 months ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...