Sciweavers

306 search results - page 11 / 62
» Do you Queue
Sort
View
CSCW
2011
ACM
12 years 11 months ago
Do you want to know?: recommending strangers in the enterprise
Recent studies on people recommendation have focused on suggesting people the user already knows. In this work, we use social media behavioral data to recommend people the user is...
Ido Guy, Sigalit Ur, Inbal Ronen, Adam Perer, Mich...
ISW
2007
Springer
14 years 1 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...
CN
2007
80views more  CN 2007»
13 years 7 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
ORL
2006
84views more  ORL 2006»
13 years 7 months ago
An M/M/1 retrial queue with unreliable server
We analyze an unreliable M/M/1 retrial queue with infinite-capacity orbit and normal queue. Retrial customers do not rejoin the normal queue but repeatedly attempt to access the s...
Nathan P. Sherman, Jeffrey P. Kharoufeh
VSTTE
2005
Springer
14 years 28 days ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...