Sciweavers

1291 search results - page 231 / 259
» Intrusion Detection for Distributed Applications
Sort
View
CN
2004
108views more  CN 2004»
13 years 8 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
PE
2007
Springer
112views Optimization» more  PE 2007»
13 years 8 months ago
Multicast inference of temporal loss characteristics
Multicast-based inference has been proposed as a method of estimating average loss rates of internal network links, using end-to-end loss measurements of probes sent over a multic...
Vijay Arya, Nick G. Duffield, Darryl Veitch
ICWS
2010
IEEE
13 years 7 months ago
Enhancing Scalability and Performance of Mashups Through Merging and Operator Reordering
Abstract—Recently, mashups are gaining tremendous popularity as an important Web 2.0 application. Mashups provide end-users with an opportunity to create personalized Web service...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...
JUCS
2010
98views more  JUCS 2010»
13 years 7 months ago
Mobile Agent-based Context-aware Services
: This paper presents an agent-based system for building and operating agent-based context-aware services in public spaces, including museums. The system provides users with agents...
Ichiro Satoh
WCRE
2010
IEEE
13 years 7 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel