Sciweavers

363 search results - page 10 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 9 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
EUROSYS
2006
ACM
14 years 4 months ago
Understanding user behavior in large-scale video-on-demand systems
Video-on-demand over IP (VOD) is one of the best-known examples of “next-generation” Internet applications cited as a goal by networking and multimedia researchers. Without em...
Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin ...
INFOCOM
2010
IEEE
13 years 6 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ARCS
2008
Springer
13 years 9 months ago
How Efficient are Creatures with Time-shuffled Behaviors?
: The task of the creatures in the "creatures' exploration problem" is to visit all empty cells in an environment with a minimum number of steps. We have analyzed th...
Patrick Ediger, Rolf Hoffmann, Mathias Halbach
VLSID
2005
IEEE
118views VLSI» more  VLSID 2005»
14 years 8 months ago
Battery Model for Embedded Systems
This paper explores the recovery and rate capacity effect for batteries used in embedded systems. It describes the prominent battery models with their advantages and drawbacks. It...
Venkat Rao, Gaurav Singhal, Anshul Kumar, Nicolas ...