Sciweavers

398 search results - page 62 / 80
» Names and Faces in the News
Sort
View
NDSS
2005
IEEE
14 years 1 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 27 days ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
SC
2004
ACM
14 years 25 days ago
Performance Tool Support for MPI-2 on Linux
Programmers of message-passing codes for clusters of workstations face a daunting challenge in understanding the performance bottlenecks of their applications. This is largely due...
Kathryn Mohror, Karen L. Karavanic
WIDM
2004
ACM
14 years 25 days ago
Next generation CiteSeer
Abstract. CiteSeer began as the first search engine for scientific literature to incorporate Autonomous Citation Indexing, and has since grown to be a well-used, open archive for...
C. Lee Giles
ALGOSENSORS
2004
Springer
14 years 25 days ago
On a Conjecture Related to Geometric Routing
We conjecture that any planar 3-connected graph can be embedded in the plane in such a way that for any nodes s and t, there is a path from s to t such that the Euclidean distance ...
Christos H. Papadimitriou, David Ratajczak