Sciweavers

5439 search results - page 1005 / 1088
» Patterns: from system design to software testing
Sort
View
SRDS
2006
IEEE
14 years 4 months ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter
MM
2006
ACM
129views Multimedia» more  MM 2006»
14 years 3 months ago
GVU-PROCAMS: enabling novel projected interfaces
Front projection allows large displays to be deployed relatively easily. However, it is sometimes difficult to find a location to place a projector, especially for ad-hoc instal...
Jay Summet, Matthew Flagg, James M. Rehg, Gregory ...
WIDM
2006
ACM
14 years 3 months ago
Identifying redundant search engines in a very large scale metasearch engine context
For a given set of search engines, a search engine is redundant if its searchable contents can be found from other search engines in this set. In this paper, we propose a method t...
Ronak Desai, Qi Yang, Zonghuan Wu, Weiyi Meng, Cle...
ATAL
2005
Springer
14 years 3 months ago
Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model
This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems. The following are key drivers...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
DRM
2005
Springer
14 years 3 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
« Prev « First page 1005 / 1088 Last » Next »