Sciweavers

675 search results - page 75 / 135
» New reals: Can live with them, can live without them
Sort
View
AH
2006
Springer
14 years 1 months ago
Considering Additional Adaptation Concerns in the Design of Web Applications
The design of Web applications traditionally relies heavily on the navigation design. The Web as it evolves now brings additional design concerns, such as omni-presence, device-dep...
Sven Casteleyn, Zoltán Fiala, Geert-Jan Hou...
CCS
2005
ACM
14 years 1 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis
IEAAIE
2001
Springer
14 years 5 days ago
A Mixed Closure-CSP Method to Solve Scheduling Problems
Scheduling problems can be seen as a set of temporal metric and disjunctive constraints. So, they can be formulated in terms of CSPs techniques. In the literature, there are CSP-b...
María Isabel Alfonso Galipienso, Federico B...
CC
2008
Springer
107views System Software» more  CC 2008»
13 years 9 months ago
How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation
Application debugging is a tedious but inevitable chore in any software development project. An effective debugger can make programmers more productive by allowing them to pause ex...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...
DIMVA
2010
13 years 8 months ago
HProxy: Client-Side Detection of SSL Stripping Attacks
Abstract. In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently, a new atta...
Nick Nikiforakis, Yves Younan, Wouter Joosen