Sciweavers

3031 search results - page 26 / 607
» Reuse in the application layer
Sort
View
DAC
2002
ACM
14 years 9 months ago
A flexible accelerator for layer 7 networking applications
In this paper, we present a flexible accelerator designed for networking applications. The accelerator can be utilized efficiently by a variety of Network Processor designs. Most ...
Gokhan Memik, William H. Mangione-Smith
ACMSE
2006
ACM
14 years 2 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
INFOCOM
2006
IEEE
14 years 2 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
ICMCS
2000
IEEE
172views Multimedia» more  ICMCS 2000»
14 years 1 months ago
Multi Layer Video Object Database based on Interactive Annotation and its Application
As the use of applications employing video contents becomes widespread, it is crucial for representation systems to be able to handle video effectively and flexibly. In this pape...
Tomoyuki Yatabe, Hiroshi Kawasaki, Hiroshi Mo, Mas...