Sciweavers

103 search results - page 19 / 21
» A case for user-level interrupts
Sort
View
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 2 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
BIRTHDAY
2004
Springer
14 years 2 months ago
A Trace Semantics for Long-Running Transactions
Abstract. A long-running transaction is an interactive component of a distributed system which must be executed as if it were a single atomic action. In principle, it should not be...
Michael J. Butler, C. A. R. Hoare, Carla Ferreira
CCS
2006
ACM
14 years 9 days ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
IWEC
2008
13 years 10 months ago
Game Bot Detection Based on Avatar Trajectory
In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generall...
Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, ...
CSAC
2006
13 years 10 months ago
Managing Network Troubles while Interacting within Collaborative Virtual Environments
Abstract. We are interested in real time collaborative interactions within Collaborative Virtual Environments (CVE). This domain relies on the low latency offered by high speed net...
Thierry Duval, Chadi El Zammar