Sciweavers

53 search results - page 7 / 11
» Cryptoschemes Based on New Signature Formation Mechanism
Sort
View
ICC
2007
IEEE
203views Communications» more  ICC 2007»
14 years 2 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
CCS
2004
ACM
14 years 1 months ago
Mitigating bandwidth-exhaustion attacks using congestion puzzles
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
XiaoFeng Wang, Michael K. Reiter
JCB
1998
129views more  JCB 1998»
13 years 7 months ago
A Sticker-Based Model for DNA Computation
We introduce a new model of molecular computation that we call the sticker model. Like many previous proposals it makes use of DNA strands as the physical substrate in which infor...
Sam T. Roweis, Erik Winfree, Richard Burgoyne, Nic...
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
14 years 2 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
PERCOM
2009
ACM
14 years 2 months ago
A Mobile Product Recommendation System Interacting with Tagged Products
— This paper presents a concept that enables consumers to access and share product recommendations using their mobile phone. Based on a review of current product recommendation m...
Felix von Reischach, Florian Michahelles, Dominiqu...