Sciweavers

101 search results - page 15 / 21
» Use of Peer-To-Peer technology in Internet access networks a...
Sort
View
SAC
2006
ACM
14 years 2 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
IJIT
2004
13 years 10 months ago
An HCI Template for Distributed Applications
Both software applications and their development environment are becoming more and more distributed. This trend impacts not only the way software computes, but also how it looks. T...
Xizhi Li
IMC
2004
ACM
14 years 2 months ago
Availability, usage, and deployment characteristics of the domain name system
The Domain Name System (DNS) is a critical part of the Internet’s infrastructure, and is one of the few examples of a robust, highlyscalable, and operational distributed system....
Jeffrey Pang, James Hendricks, Aditya Akella, Robe...
IFIP
2007
Springer
14 years 2 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...
ISM
2005
IEEE
169views Multimedia» more  ISM 2005»
14 years 2 months ago
A Framework to Improve QoS and Mobility Management for Multimedia Applications in the IMS
The new IP Multimedia Subsystem (IMS) provides an overlay architecture for IP based core networks and enables the efficient provision of an open set of potentially highly integrat...
Fabricio Carvalho de Gouveia, Thomas Magedanz