Sciweavers

4208 search results - page 780 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
JPDC
2008
134views more  JPDC 2008»
13 years 9 months ago
Middleware for data mining applications on clusters and grids
This paper gives an overview of two middleware systems that have been developed over the last 6 years to address the challenges involved in developing parallel and distributed imp...
Leonid Glimcher, Ruoming Jin, Gagan Agrawal
JPDC
2006
253views more  JPDC 2006»
13 years 9 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
IEEESP
2007
98views more  IEEESP 2007»
13 years 9 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
CN
2004
256views more  CN 2004»
13 years 9 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
CIKM
2010
Springer
13 years 7 months ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...