Sciweavers

2777 search results - page 470 / 556
» The Challenges of Service Evolution
Sort
View
CCS
2008
ACM
13 years 11 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
CEAS
2005
Springer
13 years 11 months ago
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become commonplace on the internet for protecting free online services from abuse by automated scripts/bots. They are challenges designed to b...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
CONEXT
2008
ACM
13 years 11 months ago
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
Virtual routers are a promising way to provide network services such as customer-specific routing, policy-based routing, multi-topology routing, and network virtulization. However...
Jing Fu, Jennifer Rexford
DIMEA
2008
164views Multimedia» more  DIMEA 2008»
13 years 10 months ago
Lessons learned: game design for large public displays
This paper presents the design and deployment of Polar Defence, an interactive game for a large public display. We designed this display based on a model of "users" and ...
Matthias Finke, Anthony Tang, Rock Leung, Michael ...
EDBT
2008
ACM
136views Database» more  EDBT 2008»
13 years 10 months ago
A New Approach to Modular Database Systems
In this paper we present our approach towards a modularized database management system (DBMS) whose components can be adapted at runtime and show the modularization of a DBMS bene...
Florian Irmert, Michael Daum, Klaus Meyer-Wegener