Sciweavers

10146 search results - page 1841 / 2030
» Fast FAST
Sort
View
SIGCOMM
2006
ACM
15 years 8 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
141
Voted
SIGECOM
2006
ACM
385views ECommerce» more  SIGECOM 2006»
15 years 8 months ago
B2C e-commerce development in Africa: case study of Botswana
The global wave of ICT development has become a strong driving force in almost every aspect of human endeavor. Electronic commerce (e-commerce) is fast gaining a prominent place i...
Faith-Michael E. Uzoka, Geoffrey G. Seleka
158
Voted
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 8 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
STOC
2006
ACM
121views Algorithms» more  STOC 2006»
15 years 8 months ago
On adequate performance measures for paging
Memory management is a fundamental problem in computer architecture and operating systems. We consider a two-level memory system with fast, but small cache and slow, but large mai...
Konstantinos Panagiotou, Alexander Souza
VRCAI
2006
ACM
15 years 8 months ago
Parallel-split shadow maps for large-scale virtual environments
Shadowing effects dramatically enhance the realism of virtual environments by providing useful visual cues. Shadow mapping is an efficient algorithm for real-time shadow renderin...
Fan Zhang, Hanqiu Sun, Leilei Xu, Lee Kit Lun
« Prev « First page 1841 / 2030 Last » Next »