Sciweavers

702 search results - page 87 / 141
» Making Digital Maps Accessible Using Vibrations
Sort
View
CCS
2005
ACM
14 years 2 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
14 years 2 months ago
Low overhead concurrency control for partitioned main memory databases
Database partitioning is a technique for improving the performance of distributed OLTP databases, since “single partition” transactions that access data on one partition do no...
Evan P. C. Jones, Daniel J. Abadi, Samuel Madden
CCS
2007
ACM
14 years 3 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
SAC
2009
ACM
14 years 4 months ago
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a w...
In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim...
WCNC
2008
IEEE
14 years 3 months ago
ECHO: A Quality of Service Based Endpoint Centric Handover Scheme for VoIP
– Existing terminal oriented handover mechanisms capable of meeting the strict delay bounds of real time applications such as VoIP do not consider the QoS of candidate handover n...
John Fitzpatrick, Seán Murphy, Mohammed Ati...