Sciweavers

94 search results - page 12 / 19
» Losing control of the internet: using the data plane to atta...
Sort
View
IEEEAMS
2003
IEEE
14 years 24 days ago
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...
ICCV
2007
IEEE
14 years 9 months ago
Spatio-Temporal Shape from Silhouette using Four-Dimensional Delaunay Meshing
We propose a novel method for computing a fourdimensional (4D) representation of the spatio-temporal visual hull of a dynamic scene, based on an extension of a recent provably cor...
Ehsan Aganj, Jean-Philippe Pons, Florent Sé...
ICNP
2007
IEEE
14 years 1 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 25 days ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
CEAS
2011
Springer
12 years 7 months ago
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...