Sciweavers

1102 search results - page 98 / 221
» Distributed Key Generation for the Internet
Sort
View
108
Voted
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 6 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
IPPS
1999
IEEE
15 years 6 months ago
Tailor-Made Operating Systems for Embedded Parallel Applications
This paper presents the Pure/Epos approach to deal with the high complexity of adaptable operating systems and also to diminish the distance between application and operating syste...
Antônio Augusto Fröhlich, Wolfgang Schr...
112
Voted
WWW
2007
ACM
16 years 3 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
102
Voted
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
15 years 8 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
99
Voted
JSSPP
2001
Springer
15 years 7 months ago
Characteristics of a Large Shared Memory Production Workload
This paper characterizes the production workload that highly utilizes the NCSA Origin 2000. The characterization includes the distributions of job interarrival time, requested num...
Su-Hui Chiang, Mary K. Vernon