Sciweavers

6812 search results - page 1305 / 1363
» Detection of Information Flows
Sort
View
CCS
2009
ACM
14 years 2 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
GLOBECOM
2009
IEEE
14 years 2 months ago
Maximum-Likelihood Sequence Detector for Dynamic Mode High Density Probe Storage
— There is an ever increasing need for storing data in smaller and smaller form factors driven by the ubiquitous use and increased demands of consumer electronics. A new approach...
Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy, ...
ICPP
2009
IEEE
14 years 2 months ago
Code Semantic-Aware Runahead Threads
Memory-intensive threads can hoard shared resources without making progress on a multithreading processor (SMT), thereby hindering the overall system performance. A recent promisi...
Tanausú Ramírez, Alex Pajuelo, Olive...
INFOCOM
2009
IEEE
14 years 2 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
INFOCOM
2009
IEEE
14 years 2 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
« Prev « First page 1305 / 1363 Last » Next »