Sciweavers

796 search results - page 47 / 160
» Spoofing prevention method
Sort
View
INFOCOM
2002
IEEE
14 years 2 months ago
Session-Based Overload Control in QoS-Aware Web Servers
—With the explosive use of Internet, contemporary web servers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this ...
Huamin Chen, Prasant Mohapatra
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
14 years 1 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
HCI
2001
13 years 11 months ago
Designing Internet-based systems and services for all: problems and solutions
: Most current electronic services do not address the breadth of design issues necessary to comply with `design-for-all' concepts, despite the fact that various design-for-all...
Panayiotis Koutsabasis, Jenny S. Darzentas, Julio ...
CCS
2010
ACM
13 years 9 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
HPCA
2011
IEEE
13 years 1 months ago
Bloom Filter Guided Transaction Scheduling
Contention management is an important design component to a transactional memory system. Without effective contention management to ensure forward progress, a transactional memory...
Geoffrey Blake, Ronald G. Dreslinski, Trevor N. Mu...