Sciweavers

1988 search results - page 313 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
ICDCSW
2006
IEEE
14 years 3 months ago
Handling Overload in Publish/Subscribe Systems
— This paper proposes a new approach for handling overload in Publish/Subscribe systems. We focus on the fact that every service has to cope with the limitations imposed by the e...
Zbigniew Jerzak, Christof Fetzer
AAI
2004
136views more  AAI 2004»
13 years 8 months ago
Between Location Awareness and Aware Locations: Where to Put The Intelligence
Location awareness is a key ingredient to many applications of mobile devices. Devices with the ability to determine their own position in space can retrieve, filter or present in...
Andreas Butz
CORR
2004
Springer
105views Education» more  CORR 2004»
13 years 8 months ago
A Grid-enabled Interface to Condor for Interactive Analysis on Handheld and Resource-limited Devices
This paper presents the design and implementation of a Grid-enabled interactive analysis environment for handheld and other resource-limited computing devices. Handheld devices ar...
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian J. Bun...
CCS
2007
ACM
14 years 3 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
CCS
2007
ACM
14 years 28 days ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...