Sciweavers

35419 search results - page 81 / 7084
» How are we doing
Sort
View
124
Voted
SIGCOMM
2005
ACM
15 years 9 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
106
Voted
CSFW
2007
IEEE
15 years 10 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
115
Voted
ECBS
2010
IEEE
113views Hardware» more  ECBS 2010»
15 years 6 months ago
Do Sensornet Protocol Variants Yield Real Benefits?
Simple, stateless networking protocols provide a low-cost and predictable foundation upon which to build decentralised applications. Sensornets are complex, containing emergent be...
Jonathan Tate, Iain Bate
124
Voted
ICIA
2007
15 years 5 months ago
Towel: Towards an Intelligent To-Do List
In this paper we describe Towel, a task management application that couples a user’s to-do list with a software personal assistant. This to-do list provides a unified environmen...
Kenneth Conley, James Carpenter
115
Voted
ACL
2010
15 years 1 months ago
On Learning Subtypes of the Part-Whole Relation: Do Not Mix Your Seeds
An important relation in information extraction is the part-whole relation. Ontological studies mention several types of this relation. In this paper, we show that the traditional...
Ashwin Ittoo, Gosse Bouma