Sciweavers

61 search results - page 9 / 13
» Empirical Analysis of Rate Limiting Mechanisms
Sort
View
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 2 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
CN
2007
137views more  CN 2007»
13 years 8 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
IJSEKE
2011
141views more  IJSEKE 2011»
12 years 11 months ago
Risk Assessment in Multi-disciplinary (Software+) Engineering Projects
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, l...
Stefan Biffl, Thomas Moser, Dietmar Winkler
CIVR
2010
Springer
176views Image Analysis» more  CIVR 2010»
14 years 22 days ago
The effect of baroque music on the PassPoints graphical password
Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are ...
Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang ...
BMCBI
2008
105views more  BMCBI 2008»
13 years 8 months ago
Improving the prediction of mRNA extremities in the parasitic protozoan Leishmania
Background: Leishmania and other members of the Trypanosomatidae family diverged early on in eukaryotic evolution and consequently display unique cellular properties. Their appare...
Martin Smith, Mathieu Blanchette, Barbara Papadopo...