Sciweavers

1448 search results - page 183 / 290
» Restricted Stack Implementations
Sort
View
ANSS
2003
IEEE
14 years 2 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
SPAA
2003
ACM
14 years 2 months ago
Relaxing the problem-size bound for out-of-core columnsort
Previous implementations of out-of-core columnsort limit the problem size to N ≤ (M/P)3/2, where N is the number of records to sort, P is the number of processors, and M is the ...
Geeta Chaudhry, Elizabeth A. Hamon, Thomas H. Corm...
CC
2003
Springer
126views System Software» more  CC 2003»
14 years 2 months ago
Rapid and Robust Compiler Construction Using Template-Based Metacompilation
We have developed Tm, a template-based metacompiler. Given a set of data-structure definitions and a template, Tm generates files that instantiate the template for the given data...
Kees van Reeuwijk
GI
2003
Springer
14 years 2 months ago
Active Data Protection with Data Journals
: A major privacy problem on the internet is the unrestricted sharing of user data between services and other parties. The EU privacy legislation grants the user the rights to rest...
Lars Brückner, Jan Steffan, Wesley Terpstra, ...
DANCE
2002
IEEE
14 years 2 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...