Sciweavers

784 search results - page 2 / 157
» An underlying model for defeat mechanisms
Sort
View
DSN
2009
IEEE
14 years 2 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
SIGCOMM
1995
ACM
13 years 11 months ago
A Mobile User Location Update and Paging Mechanism Under Delay Constraints
A mobile user location management mechanism is introduced that incorporates a distance based location update scheme and a paging mechanism that satis es prede ned delay requiremen...
Ian F. Akyildiz, Joseph S. M. Ho
SIGOPSE
2004
ACM
14 years 22 days ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
COGSCI
2010
114views more  COGSCI 2010»
13 years 7 months ago
Direct Associations or Internal Transformations? Exploring the Mechanisms Underlying Sequential Learning Behavior
We evaluate two broad classes of cognitive mechanisms that might support the learning of sequential patterns. According to the first, learning is based on the gradual accumulation...
Todd M. Gureckis, Bradley C. Love
IWQOS
2004
Springer
14 years 20 days ago
A mechanism for equitable bandwidth allocation under QoS and budget constraints
— Equitable bandwidth allocation is essential when QoS requirements and purchasing power vary among users. To this end, we present a mechanism for bandwidth allocation based on d...
Sreenivas Gollapudi, D. Sivakumar