Sciweavers

3296 search results - page 609 / 660
» Gathercast with Active Networks
Sort
View
INFOCOM
2009
IEEE
14 years 5 months ago
Estimating Hop Distance Between Arbitrary Host Pairs
—Establishing a clear and timely picture of Internet topology is complicated by many factors including the vast size and dynamic nature of the infrastructure. In this paper, we d...
Brian Eriksson, Paul Barford, Robert D. Nowak
INFOCOM
2009
IEEE
14 years 5 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
IMC
2009
ACM
14 years 5 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
IMC
2009
ACM
14 years 5 months ago
Moving beyond end-to-end path information to optimize CDN performance
Replicating content across a geographically distributed set of servers and redirecting clients to the closest server in terms of latency has emerged as a common paradigm for impro...
Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srini...
SOUPS
2009
ACM
14 years 5 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...