Sciweavers

446 search results - page 75 / 90
» SP-to-SP service ordering specification and its implementati...
Sort
View
LCN
2005
IEEE
14 years 2 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
ATAL
2006
Springer
14 years 17 days ago
Performance evaluation of open-source multiagent platforms
Nowadays, most multiagent platforms are internally designed as middleware and are usually implemented in Java and run on top of an operating system. This kind of design maximizes ...
Luis Mulet, Jose M. Such, Juan M. Alberola
CCS
2008
ACM
13 years 10 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
PUC
2008
137views more  PUC 2008»
13 years 8 months ago
Middleware support for the deployment of ubiquitous software components
A number of emerging distributed platforms include xed and robust workstations but, like dynamic and pervasive networks, are often built from mobile and resource-constrained device...
Didier Hoareau, Yves Mahéo
JSS
2008
93views more  JSS 2008»
13 years 8 months ago
A language for high-level description of adaptive web systems
This paper focuses on the proposal, design, and implementation of AWL, the Adaptive Web Language. Also, an example application named PENS is explained and implemented in AWL. AWL ...
S. Hossein Sadat-Mohtasham, Ali A. Ghorbani