Biblio

Export 12491 results:
1998
Reiter AT&TLabs -Res, Anupam V, Mayer A.  1998.  Detecting Hit Shaving in Click-Through Payment Schemes. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Chalup SRose, Hogan C, Kulosa G, McDonald B, Stansell B.  1998.  Drinking from the Fire(walls) Hose: Another Approach to Very Large Mailing Lists. 12th Systems Administration Conference (LISA 98).
Rizzo L.  1998.  Dummynet and Forward Error Correction. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Hjalmtysson G, Gray R.  1998.  Dynamic C++ Classes - A Lightweight Mechanism to Update Code in a Running Program. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Belaid D, Provenzano N, Taconet C.  1998.  Dynamic Management of CORBA Trader Federation. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Bruno J, Gabber E, Özden B, Silberschatz A.  1998.  The Eclipse Operating System: Providing Quality of Service via Reservation Domains. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Krishnaswamy V, Walther D, Bhola S, Bommaiah E, Riley G, Topol B, Ahamad M.  1998.  Efficient Implementation of Java Remote Method Invocation (RMI}}}}). 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Harkavy M, Tygar J.D, Kikuchi H.  1998.  Electronic Auctions with Private Bids. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Kelsey J, Schneier B.  1998.  Electronic Commerce and the Street Performer. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Juul NChristian, Andersen KViborg, Bjørn-Andresen N.  1998.  Electronic Commerce in Denmark: The Spread of EDI in Business-to-Business Transactions. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Treese W, Feigenbaum J.  1998.  Electronic Commerce Needs No PKI. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Gauntt Jdu Pre.  1998.  Electronic Commerce on the Move. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Menezes A.  1998.  Elliptic Curves - Ready for Prime Time. 7th USENIX Security Symposium (USENIX Security 98).
D. McCriskard S.  1998.  Enhancing Interfaces with Animated Widgets. 6th Annual Tcl/Tk Conference (6th Annual Tcl/Tk Conference).
Anderson RJ, Matyás, Jr. V, Petitcolas FA.  1998.  The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Wang Z, Rubin N.  1998.  Evaluating the Importance of User-Specific Profiling. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).
Allman E.  1998.  The Evolution of Open Source Software. 12th Systems Administration Conference (LISA 98).
Cha L, Motta C, Babar S, Agarwal M, Ma J, Shaikh W, Marko I.  1998.  The Evolution of the CMD Computing Environment: A Case Study in Rapid Growth. 12th Systems Administration Conference (LISA 98).
De Pauw W, Lorenz D, Vlissides J, Wegman M.  1998.  Execution Patterns in Object-Oriented Visualization. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Mehta NV, Sollins KR.  1998.  Expanding and Extending the Security Features of Java. 7th USENIX Security Symposium (USENIX Security 98).
Schulz M, Hellwagner H.  1998.  Extending NT Virtual Memory by SCI-based Hardware DSM. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).
Santos MD, Melliar-Smith P.M, Moser L.E.  1998.  An Extensible Remote Graphical Interface for an ATM Network Simulator. 6th Annual Tcl/Tk Conference (6th Annual Tcl/Tk Conference).
Lenstra AK.  1998.  Factoring: Facts and Fables. 7th USENIX Security Symposium (USENIX Security 98).
Peacock K, Kamaraju A, Agrawal S.  1998.  Fast Consistency Checking for the Solaris File System. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Hitz D, Allison B, Borr A, Hawley R, Muhlestein M.  1998.  File System Security: An Integrated Model for NT and UNIX File Service. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).

Pages