Sciweavers

1675 search results - page 99 / 335
» The Value of a Good Name
Sort
View
NDSS
2006
IEEE
14 years 2 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
EPIA
2005
Springer
14 years 2 months ago
Revised Stable Models - A Semantics for Logic Programs
This paper introduces an original 2-valued semantics for Normal Logic Programs (NLP), which conservatively extends the Stable Model semantics (SM) to all normal programs. The dist...
Luís Moniz Pereira, Alexandre Miguel Pinto
COCOON
2006
Springer
14 years 20 days ago
Improved On-Line Broadcast Scheduling with Deadlines
We study an on-line broadcast scheduling problem in which requests have deadlines, and the objective is to maximize the weighted throughput, i.e., the weighted total length of the ...
Feifeng Zheng, Stanley P. Y. Fung, Wun-Tat Chan, F...
IESA
2007
13 years 10 months ago
UN/CEFACT Core Components as the basis for structured business communication by SMEs, employing auto-generated, user adjustable
In this paper a methodology is presented to generate webforms for business documents directly from XML schemas. XML Schemas that are based on the UN/CEFACT Naming and Design Rules ...
Fred van Blommestein, Bertjan Broeksema
PDPTA
2007
13 years 10 months ago
Communication with Super Flexible Messaging
Abstract Super Flexible Messaging (SFM) provides a powerful and elegant message passing abstraction for transferring arbitrary data between remote processes. SFM achieves the simpl...
Alexey Fedosov, Gregory Benson