Sciweavers

1424 search results - page 150 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ISCAPDCS
2004
13 years 9 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
MUE
2009
IEEE
252views Multimedia» more  MUE 2009»
14 years 3 months ago
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats...
Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan
JSS
2007
105views more  JSS 2007»
13 years 8 months ago
Composing pattern-based components and verifying correctness
Designing large software systems out of reusable components has become increasingly popular. Although liberal composition of reusable components saves time and expense, many exper...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, S...
ICCAD
2004
IEEE
114views Hardware» more  ICCAD 2004»
14 years 5 months ago
High-level synthesis using computation-unit integrated memories
Abstract— High-level synthesis (HLS) of memory-intensive applications has featured several innovations in terms of enhancements made to the basic memory organization and data lay...
Chao Huang, Srivaths Ravi, Anand Raghunathan, Nira...
JCDL
2011
ACM
221views Education» more  JCDL 2011»
12 years 11 months ago
Integrating implicit structure visualization with authoring promotes ideation
We need to harness the growing wealth of information in digital libraries to support intellectual work involving creative and exploratory processes. Prior research on hypertext au...
Andrew M. Webb, Andruid Kerne