Sciweavers

438 search results - page 27 / 88
» Defending Critical Infrastructure
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
ACSAC
2010
IEEE
13 years 6 months ago
Always up-to-date: scalable offline patching of VM images in a compute cloud
Patching is a critical security service that keeps computer systems up to date and defends against security threats. Existing patching systems all require running systems. With th...
Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, R...
INFOCOM
2007
IEEE
14 years 3 months ago
Stochastic Fluid Theory for P2P Streaming Systems
—We develop a simple stochastic fluid model that seeks to expose the fundamental characteristics and limitations of P2P streaming systems. This model accounts for many of the es...
Rakesh Kumar, Yong Liu, Keith W. Ross
EUC
2005
Springer
14 years 2 months ago
Ubiquitous Content Formulations for Real-Time Information Communications
Abstract. With rapid advancements in wireless devices, ubiquitous computing seems becoming a reality everyday. Active pervasive network infrastructure has been introduced to offer...
Ka Lun Eddie Law, Sunny So
ACMDIS
1995
ACM
14 years 10 days ago
Facilitating Communication in Software Development
Effective communication is critical to the success of a software development project. It factors into the productivity of individuals and organizations, and has particular impact ...
Michael E. Atwood, Bart Burns, Dieter Gairing, And...