Sciweavers

18493 search results - page 3630 / 3699
» Timers for Distributed Systems
Sort
View
130
Voted
CCS
2003
ACM
15 years 7 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
CCS
2003
ACM
15 years 7 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
164
Voted
ECCV
2010
Springer
15 years 7 months ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov
EAGC
2003
Springer
15 years 7 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
132
Voted
ECOOPW
2003
Springer
15 years 7 months ago
Object Orientation and Web Services
The annual European workshop on Object Orientation and Web Services focusses challenges and potentials of service-oriented computing in relation to object-oriented technologies and...
Anthony Finkelstein, Winfried Lamersdorf, Frank Le...
« Prev « First page 3630 / 3699 Last » Next »