Sciweavers

1466 search results - page 206 / 294
» Completeness of the Authentication Tests
Sort
View
HOTI
2005
IEEE
14 years 1 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
INFOCOM
2005
IEEE
14 years 1 months ago
DotSlash: handling Web hotspots at dynamic content Web sites
We propose DotSlash, a self-configuring and scalable rescue system, for handling web hotspots at dynamic content web sites. To support load migration for dynamic content, an orig...
Weibin Zhao, Henning Schulzrinne
ISCA
2005
IEEE
166views Hardware» more  ISCA 2005»
14 years 1 months ago
Increased Scalability and Power Efficiency by Using Multiple Speed Pipelines
One of the most important problems faced by microarchitecture designers is the poor scalability of some of the current solutions with increased clock frequencies and wider pipelin...
Emil Talpes, Diana Marculescu
IMC
2005
ACM
14 years 1 months ago
Combining Filtering and Statistical Methods for Anomaly Detection
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Augustin Soule, Kavé Salamatian, Nina Taft
ATAL
2005
Springer
14 years 1 months ago
Using emergence in participatory simulations to design multi-agent systems
In this paper, we present, through simulations of the coffee market of the state of Veracruz, how emergence of specialized roles in participatory simulations could be used to desi...
Paul Guyot, Alexis Drogoul, Christian Lemaît...