Sciweavers

7274 search results - page 1371 / 1455
» Abstractions for network update
Sort
View
146
Voted
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
15 years 1 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
133
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
A Comparison and Critique of Eucalyptus, OpenNebula and Nimbus
Eucalyptus, OpenNebula and Nimbus are three major open-source cloud-computing software platforms. The overall function of these systems is to manage the provisioning of virtual ma...
Peter Sempolinski, Douglas Thain
151
Voted
CNSM
2010
15 years 1 months ago
Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains
Abstract--Change Management, a core process of the Information Technology Infrastructure Library (ITIL), is concerned with the management of changes to IT infrastructure and servic...
Sebastian Hagen, Alfons Kemper
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
139
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Assessing the Impact of Geographically Correlated Failures on Overlay-Based Data Dissemination
Abstract--This paper addresses reliability of data dissemination applications when there are severe disruptions to the underlying physical infrastructure. Such massive simultaneous...
Kyungbaek Kim, Nalini Venkatasubramanian
« Prev « First page 1371 / 1455 Last » Next »