Sciweavers

554 search results - page 90 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
WCRE
2009
IEEE
14 years 3 months ago
A Study of the Time Dependence of Code Changes
—Much of modern software development consists of building on older changes. Older periods provide the structure (e.g., functions and data types) on which changes in future period...
Omar Alam, Bram Adams, Ahmed E. Hassan
MIDDLEWARE
2009
Springer
14 years 3 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
ICIAP
1999
ACM
14 years 29 days ago
Shape Reconstruction of 3D Bilaterally Symmetric Surfaces
The paper presents a new approach for shape recovery based on integratinggeometric and photometric information. We consider 3D bilaterally symmetric objects, that is, objects which...
Ilan Shimshoni, Michael Lindenbaum, Yael Moses
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 27 days ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
CASCON
2007
112views Education» more  CASCON 2007»
13 years 10 months ago
Removing manually generated boilerplate from electronic texts: experiments with project Gutenberg e-books
Collaborative work on unstructured or semistructured documents, such as in literature corpora or source code, often involves agreed upon templates containing metadata. These templ...
Owen Kaser, Daniel Lemire