Sciweavers

554 search results - page 88 / 111
» Designing Comprehensible Self-Organising Systems
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
CCS
2006
ACM
14 years 1 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
ER
1997
Springer
112views Database» more  ER 1997»
14 years 1 months ago
Perspectives in Modeling: Simulation, Database, and Workflow
Development of today's advanced applications is increasingly being accomplished using multi-faceted modeling. For example, the areas of simulation and workflow modeling genera...
John A. Miller, Amit P. Sheth, Krys Kochut
CIVR
2008
Springer
138views Image Analysis» more  CIVR 2008»
13 years 11 months ago
Visual islands: intuitive browsing of visual search results
The amount of available digital multimedia has seen exponential growth in recent years. While advances have been made in the indexing and searching of images and videos, less focu...
Eric Zavesky, Shih-Fu Chang, Cheng-Chih Yang
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang