Sciweavers

64 search results - page 9 / 13
» An Empirical Study of Denial of Service Mitigation Technique...
Sort
View
IWC
2007
106views more  IWC 2007»
13 years 9 months ago
The role of social presence in establishing loyalty in e-Service environments
Compared to offline shopping, the online shopping experience may be viewed as lacking human warmth and sociability as it is more impersonal, anonymous, automated and generally dev...
Dianne Cyr, Khaled Hassanein, Milena M. Head, Alex...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 3 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
ASPLOS
2010
ACM
14 years 4 months ago
Addressing shared resource contention in multicore processors via scheduling
Contention for shared resources on multicore processors remains an unsolved problem in existing systems despite significant research efforts dedicated to this problem in the past...
Sergey Zhuravlev, Sergey Blagodurov, Alexandra Fed...
USS
2004
13 years 11 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
14 years 11 months ago
SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
In a mobile service scenario, users query a server for nearby points of interest but they may not want to disclose their locations to the service. Intuitively, location privacy may...
Man Lung Yiu, Christian S. Jensen, Xuegang Huang, ...