Sciweavers

1663 search results - page 133 / 333
» Computer Security in the Real World
Sort
View
124
Voted
BSDCON
2003
15 years 5 months ago
GBDE-GEOM Based Disk Encryption
The ever increasing mobility of computers has made protection of data on digital storage media an important requirement in a number of applications and situations. GBDE is a stron...
Poul-Henning Kamp
120
Voted
CAGD
2006
90views more  CAGD 2006»
15 years 3 months ago
Local hybrid approximation for scattered data fitting with bivariate splines
We suggest a local hybrid approximation scheme based on polynomials and radial basis functions, and use it to modify the scattered data fitting algorithm of [7]. Similar to that a...
Oleg Davydov, Rossana Morandi, Alessandra Sestini
198
Voted
ICDE
2007
IEEE
105views Database» more  ICDE 2007»
16 years 5 months ago
Oscar: A Data-Oriented Overlay For Heterogeneous Environments
Quite a few data-oriented overlay networks have been designed in recent years. These designs often (implicitly) assume various homogeneity which seriously limit their usability in...
Sarunas Girdzijauskas, Anwitaman Datta, Karl Abere...
98
Voted
CCS
2010
ACM
15 years 10 months ago
Region-based BGP announcement filtering for improved BGP security
BGP prefix hijacking is a serious security threat on the Internet. In this paper we propose a region-based BGP announcement filtering scheme (RBF) to improve the BGP security. I...
Fernando Sanchez, Zhenhai Duan
114
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 4 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki