Sciweavers

1016 search results - page 130 / 204
» Explore or Exploit
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Packet Reordering in Network Processors
Network processors today consists of multiple parallel processors (microengines) with support for multiple threads to exploit packet level parallelism inherent in network workload...
S. Govind, R. Govindarajan, Joy Kuri
SECON
2007
IEEE
14 years 3 months ago
A Framework for Resilient Online Coverage in Sensor Networks
—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
14 years 3 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
ADAPTIVE
2007
Springer
14 years 3 months ago
User Profiles for Personalized Information Access
Abstract. The amount of information available online is increasing exponentially. While this information is a valuable resource, its sheer volume limits its value. Many research pr...
Susan Gauch, Mirco Speretta, Aravind Chandramouli,...
CEAS
2007
Springer
14 years 3 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage