Sciweavers

318 search results - page 59 / 64
» A New Perspective on Internet Security using Insurance
Sort
View
132
Voted
ANCS
2006
ACM
15 years 9 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
208
Voted
LCN
2008
IEEE
15 years 10 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
113
Voted
ICNP
2007
IEEE
15 years 10 months ago
Best Effort Session-Level Congestion Control
— Congestion caused by a large number of interacting TCP flows at a bottleneck network link is different from that caused by a lesser number of flows sending large amounts of d...
S. Ramesh, Sneha Kumar Kasera
158
Voted
ICWS
2009
IEEE
16 years 24 days ago
Service-Oriented Architecture for Privacy-Preserving Data Mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers t...
Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. ...
112
Voted
ML
2006
ACM
15 years 9 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII