Sciweavers

759 search results - page 41 / 152
» What Can Be Implemented Anonymously
Sort
View
SAC
2010
ACM
14 years 4 months ago
A robust link-translating proxy server mirroring the whole web
Link-translating proxies are widely used for anonymous browsing, policy circumvention and WebVPN functions. These are implemented by encoding the destination URL in the path of th...
Ziqing Mao, Cormac Herley
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
14 years 2 months ago
Using Event Semantics for Modeling Contracts
Currently a number of these on-line support systems for electronic contracting are under development. In this paper we develop a logical formalism to represent the content of busi...
Yao-Hua Tan, Walter Thoen
WICSA
2008
13 years 11 months ago
Using Types to Enforce Architectural Structure
The right software architecture is critical to achieving essential quality attributes, but these qualities are only realized if the program as implemented conforms to its intended...
Jonathan Aldrich
INFOCOM
2006
IEEE
14 years 4 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
FAST
2004
13 years 11 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok