Sciweavers

1352 search results - page 197 / 271
» Designing Security Requirements Models Through Planning
Sort
View
HPDC
2002
IEEE
14 years 1 months ago
A Scalable QoS-Aware Service Aggregation Model for Peer-to-Peer Computing Grids
Peer-to-peer (P2P) computing grids consist of peer nodes that communicate directly among themselves through wide-area networks and can act as both clients and servers. These syste...
Xiaohui Gu, Klara Nahrstedt
ACSAC
2007
IEEE
14 years 3 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
SIGCOMM
2010
ACM
13 years 9 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
BMCBI
2008
107views more  BMCBI 2008»
13 years 9 months ago
A mixture model approach to sample size estimation in two-sample comparative microarray experiments
Background: Choosing the appropriate sample size is an important step in the design of a microarray experiment, and recently methods have been proposed that estimate sample sizes ...
Tommy S. Jørstad, Herman Midelfart, Atle M....
ICRA
2006
IEEE
113views Robotics» more  ICRA 2006»
14 years 2 months ago
Mobile in vivo Biopsy Robot
– A mobile in vivo camera robot was developed to provide the ability for a single port biopsy procedure. Such a robot can be inserted into the abdominal cavity through a standard...
Mark Rentschler, Jason Dumpert, Stephen Platt, Dmi...