Sciweavers

35419 search results - page 100 / 7084
» How are we doing
Sort
View
172
Voted
DEBU
2000
96views more  DEBU 2000»
15 years 3 months ago
What do the Neighbours Think? Computing Web Page Reputations
The textual content of the Web enriched with the hyperlink structure surrounding it can be a useful source of information for querying and searching. This paper presents a search ...
Alberto O. Mendelzon, Davood Rafiei
DSN
2004
IEEE
15 years 7 months ago
HOURS: Achieving DoS Resilience in an Open Service Hierarchy
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This pap...
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zh...
162
Voted
APNOMS
2006
Springer
15 years 7 months ago
IP Traceback Algorithm for DoS/DDoS Attack
Abstract. DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do n...
Hong-bin Yim, Jae-il Jung
152
Voted
ICIA
2007
15 years 6 months ago
Enhancing Interaction with To-Do Lists: Using Artificial Assistants
Assisting users with To Do lists presents new challenges for intelligent user interfaces. This paper presents our approach and an implemented system, BEAM, to process To Do list e...
Yolanda Gil, Timothy Chklovski
148
Voted
ICARIS
2007
Springer
15 years 7 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq