Sciweavers

192 search results - page 29 / 39
» An autonomous explore exploit strategy
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 3 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
WIOPT
2006
IEEE
14 years 3 months ago
Flow-level stability of channel-aware scheduling algorithms
— Channel-aware scheduling strategies provide an effective mechanism for improving the throughput performance in wireless data networks by exploiting channel fluctuations. The p...
Sem C. Borst, Matthieu Jonckheere
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 2 months ago
Survey of Strategic Alignment Impacts on Organizational Performance in International European Companies
act The strategic use of technology based information systems (IS/IT) is a fundamental issue for every business. This is particularly true in the case of firms that engage in inter...
Hajer Kefi, Michel Kalika
INFOCOM
2005
IEEE
14 years 2 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
INFOCOM
2003
IEEE
14 years 2 months ago
User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks
— Channel-aware scheduling strategies, such as the Proportional Fair algorithm for the CDMA 1xEV-DO system, provide an effective mechanism for improving throughput performance in...
Sem C. Borst