Sciweavers

443 search results - page 15 / 89
» Dynamic Authorization and Intrusion Response in Distributed ...
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
14 years 1 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
WAIM
2009
Springer
14 years 2 months ago
Dynamic Data Migration Policies for Query-Intensive Distributed Data Environments
Abstract. Modern large distributed applications, such as telecommunication and banking services, need to respond instantly to a huge number of queries within a short period of time...
Tengjiao Wang, Bishan Yang, Allen Huang, Qi Zhang,...
HUC
2009
Springer
14 years 17 days ago
The commodification of location: dynamics of power in location-based systems
Location-based ubiquitous computing systems are entering mainstream society and becoming familiar parts of everyday life. However, the settings in which they are deployed are alre...
Irina Shklovski, Janet Vertesi, Emily Troshynski, ...
CORR
2011
Springer
189views Education» more  CORR 2011»
13 years 3 months ago
Aging in language dynamics
Human languages evolve continuously, and a puzzling problem is how to reconcile the apparent robustness of most of the deep linguistic structures we use with the evidence that the...
Animesh Mukherjee, Francesca Tria, Andrea Baronche...