Sciweavers

1196 search results - page 134 / 240
» High Availability and Scalability Support for Web Applicatio...
Sort
View
PERCOM
2011
ACM
13 years 27 days ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 4 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
EUROSYS
2006
ACM
14 years 6 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
WWW
2001
ACM
14 years 9 months ago
Personalizing E-commerce applications with on-line heuristic decision making
This paper describes new technology based on on-line decision support for providing personalized customer treatments in web-based storefronts and information sites. The central im...
Vinod Anupam, Richard Hull, Bharat Kumar
CCGRID
2003
IEEE
14 years 2 months ago
Recovering Internet Symmetry in Distributed Computing
This paper describes two systems to recover the Internet connectivity impaired by private networks and firewalls. These devices cause asymmetry in the Internet, making peer-to-pee...
Se-Chang Son, Miron Livny