Sciweavers

95 search results - page 8 / 19
» A Traitor Tracing Scheme Based on the RSA System
Sort
View
RSA
2008
80views more  RSA 2008»
13 years 6 months ago
The persistent-access-caching algorithm
ABSTRACT: Caching is widely recognized as an effective mechanism for improving the performance of the World Wide Web. One of the key components in engineering the Web caching syste...
Predrag R. Jelenkovic, Ana Radovanovic
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 1 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
ICDE
2000
IEEE
144views Database» more  ICDE 2000»
13 years 12 months ago
Practical Lineage Tracing in Data Warehouses
We consider the view data lineage problem in a warehousing environment: For a given data item in a materialized warehouse view, we want to identify the set of source data items th...
Yingwei Cui, Jennifer Widom
MICRO
2003
IEEE
135views Hardware» more  MICRO 2003»
14 years 23 days ago
Generational Cache Management of Code Traces in Dynamic Optimization Systems
A dynamic optimizer is a runtime software system that groups a program’s instruction sequences into traces, optimizes those traces, stores the optimized traces in a softwarebase...
Kim M. Hazelwood, Michael D. Smith