Sciweavers

1866 search results - page 347 / 374
» A graph-theoretic approach to distributed control over netwo...
Sort
View
TWC
2010
13 years 3 months ago
Cooperative wireless multicast: performance analysis and power/location optimization
The popularity of multimedia multicast/broadcast applications over wireless networks makes it critical to address the error-prone, heterogeneous and dynamically changing nature of ...
H. Vicky Zhao, Weifeng Su
DEXA
2009
Springer
166views Database» more  DEXA 2009»
14 years 3 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...
CCS
2005
ACM
14 years 2 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
CCS
2003
ACM
14 years 2 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
OSDI
2004
ACM
14 years 9 months ago
Boxwood: Abstractions as the Foundation for Storage Infrastructure
Abstractions as the Foundation for Storage Infrastructure John MacCormick, Nick Murphy, Marc Najork, Chandramohan A. Thekkath, and Lidong Zhou Microsoft Research Silicon Valley Wr...
John MacCormick, Nick Murphy, Marc Najork, Chandra...