Sciweavers

832 search results - page 61 / 167
» Effect of Malicious Synchronization
Sort
View
PDSE
1998
105views more  PDSE 1998»
13 years 11 months ago
A Case-Based Parallel Programming System
This paper describes how to reduce the burden of parallel programming by utilizing relevant parallel programs. Parallel algorithms are divided into four classes and a case base fo...
Katsuhiro Yamazaki, Shoichi Ando
COLCOM
2007
IEEE
14 years 4 months ago
Countering feedback sparsity and manipulation in reputation systems
—Reputation systems provide a promising way for building trust through social control in collaborative communities by harnessing the community knowledge in the form of feedback. ...
Li Xiong, Ling Liu, Mustaque Ahamad
HASE
2007
IEEE
14 years 4 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 4 months ago
Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks
— Distributed Denial of Service attacks pose a serious threat to many businesses which rely on constant availability of their network services. Companies like Google, Yahoo and A...
Stefan Seufert, Darragh O'Brien
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 3 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson