Sciweavers

2316 search results - page 146 / 464
» How Asymmetric Is the Internet
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
IEEEAMS
2003
IEEE
15 years 9 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
LAWEB
2003
IEEE
15 years 9 months ago
Extracting Knowledge from Association Relationships to Build Navigational Models
This paper analyzes how the semantics of association relationships in OO conceptual modeling can help to build Navigational Models for Web Applications. The work has been develope...
Manoli Albert, Vicente Pelechano, Joan Fons, Gonza...
SAINT
2003
IEEE
15 years 9 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
SAINT
2003
IEEE
15 years 9 months ago
Data Storage Requirements for the Service Oriented Computing
Service oriented computing and peer-to-peer (P2P) computing are emerging technologies which provide, from the architectural point of view, scalability and flexibility. From their...
Thomas Risse, Predrag Knezevic