Sciweavers

1018 search results - page 186 / 204
» Remote User Authentication Using Public Information
Sort
View
ISW
2005
Springer
14 years 1 months ago
gore: Routing-Assisted Defense Against DDoS Attacks
Abstract. We present gore, a routing-assisted defense architecture against distributed denial of service (DDoS) attacks that provides guaranteed levels of access to a network under...
Stephen T. Chou, Angelos Stavrou, John Ioannidis, ...
BMCBI
2010
108views more  BMCBI 2010»
13 years 5 months ago
BIGSdb: Scalable analysis of bacterial genome variation at the population level
Background: The opportunities for bacterial population genomics that are being realised by the application of parallel nucleotide sequencing require novel bioinformatics platforms...
Keith A. Jolley, Martin C. J. Maiden
CCS
2010
ACM
14 years 2 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
MM
2010
ACM
210views Multimedia» more  MM 2010»
13 years 8 months ago
Increasing interactivity in street view web navigation systems
This paper presents some interactive features we have added on our street-view web navigation application. Our system allows to navigate through a huge amount of data (panoramas a...
Alexandre Devaux, Nicolas Paparoditis
JCDL
2005
ACM
111views Education» more  JCDL 2005»
14 years 1 months ago
Digitization and 3D modeling of movable books
Movable books provide interesting challenges for digitization and user interfaces design. We report in this paper some preliminary results in the building of a 3D visualization wo...
Pierre Cubaud, Jérôme Dupire, Alexand...