Sciweavers

7587 search results - page 1472 / 1518
» Network Analysis and Visualisation
Sort
View
IPPS
2008
IEEE
14 years 2 months ago
On the need for query-centric unstructured peer-to-peer overlays
—Hybrid P2P systems rely on the assumption that sufficient objects exist nearby in order to make the unstructured search component efficient. This availability depends on the o...
William Acosta, Surendar Chandra
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 2 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
BIBE
2007
IEEE
162views Bioinformatics» more  BIBE 2007»
14 years 2 months ago
An Investigation into the Feasibility of Detecting Microscopic Disease Using Machine Learning
— The prognosis for many cancers could be improved dramatically if they could be detected while still at the microscopic disease stage. We are investigating the possibility of de...
Mary Qu Yang, Jack Y. Yang
CODES
2007
IEEE
14 years 2 months ago
Predator: a predictable SDRAM memory controller
Memory requirements of intellectual property components (IP) in contemporary multi-processor systems-on-chip are increasing. Large high-speed external memories, such as DDR2 SDRAM...
Benny Akesson, Kees Goossens, Markus Ringhofer
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
« Prev « First page 1472 / 1518 Last » Next »