Sciweavers

28 search results - page 4 / 6
» Analyzing Resource-Usage Impact on Component-Based Systems P...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
WOSP
1998
ACM
13 years 12 months ago
Predicting memory use from a class diagram using dynamic information
Increasingly, new applications are being built by composing existing software components rather than by coding a system from scratch. Using this approach, applications can be buil...
Gail C. Murphy, Ekaterina Saenko
INFOCOM
2010
IEEE
13 years 6 months ago
Adaptive Calibration for Fusion-based Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are typically composed of low-cost sensors that are deeply integrated with physical environments. As a result, the sensing performance of...
Rui Tan, Guoliang Xing, Xue Liu, Jianguo Yao, Zhao...
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 2 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
EICS
2009
ACM
14 years 2 months ago
Engineering crowd interaction within smart environments
Smart environments (e.g., airports, hospitals, stadiums, and other physical spaces using ubiquitous computing to empower many mobile people) provide novel challenges for usability...
Michael D. Harrison, Mieke Massink, Diego Latella