Sciweavers

138 search results - page 19 / 28
» Damage control
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Reduction of quality (RoQ) attacks on Internet end-systems
— Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairnes...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
PRESENCE
2007
151views more  PRESENCE 2007»
13 years 7 months ago
Haptic Feedback in a Telepresence System for Endoscopic Heart Surgery
The implementation of telemanipulator systems for cardiac surgery enabled heart surgeons to perform delicate minimally invasive procedures with high precision under stereoscopic v...
Hermann Georg Mayer, Istvan Nagy, Alois Knoll, Eva...
HICSS
2010
IEEE
172views Biometrics» more  HICSS 2010»
14 years 2 months ago
Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA
Worldwide social networks, like Facebook, face fierce competition from local platforms when expanding globally. To remain attractive social network providers need to encourage use...
Hanna Krasnova, Natasha F. Veltri
GLOBECOM
2008
IEEE
14 years 1 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
ACSAC
2007
IEEE
14 years 1 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth