Sciweavers

1356 search results - page 101 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
NSDI
2004
13 years 9 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy
ADHOCNETS
2009
Springer
14 years 2 months ago
Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis
Node clustering and data aggregation are popular techniques to reduce energy consumption in large WSNs and a large body of literature has emerged describing various clustering prot...
Anna Förster, Alexander Förster, Amy L. ...
IPPS
2007
IEEE
14 years 2 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
ATAL
2008
Springer
13 years 10 months ago
Structure in threes: modelling organization-oriented software architectures built upon multi-agent systems
Software systems are subject to increasing complexity and in need of efficient structuring. Multi-agent system research has come up with approaches for an organization-oriented co...
Matthias Wester-Ebbinghaus, Daniel Moldt
AC
2004
Springer
13 years 8 months ago
Shotgun Sequence Assembly
Shotgun sequencing is the most widely used technique for determining the DNA sequence of organisms. It involves breaking up the DNA into many small pieces that can be read by auto...
Mihai Pop