Sciweavers

138 search results - page 19 / 28
» Damage control
Sort
View
135
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
Reduction of quality (RoQ) attacks on Internet end-systems
— Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairnes...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
129
Voted
PRESENCE
2007
151views more  PRESENCE 2007»
15 years 2 months ago
Haptic Feedback in a Telepresence System for Endoscopic Heart Surgery
The implementation of telemanipulator systems for cardiac surgery enabled heart surgeons to perform delicate minimally invasive procedures with high precision under stereoscopic v...
Hermann Georg Mayer, Istvan Nagy, Alois Knoll, Eva...
118
Voted
HICSS
2010
IEEE
172views Biometrics» more  HICSS 2010»
15 years 9 months ago
Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA
Worldwide social networks, like Facebook, face fierce competition from local platforms when expanding globally. To remain attractive social network providers need to encourage use...
Hanna Krasnova, Natasha F. Veltri
100
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
103
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth