Sciweavers

2747 search results - page 122 / 550
» Network externalities in software systems
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 9 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
114
Voted
CISIS
2007
IEEE
15 years 9 months ago
Implementation and Performance of a New Teleconference System by High Definition Omni-Directional Video Transmission over IP Net
In this paper, a flexible middleware system for omni-directional video transmission for various teleconferencing applications is introduced. The omni-directional image has more ad...
Yosuke Sato, Yuya Maita, Koji Hashimoto, Yoshitaka...
130
Voted
EUROSYS
2008
ACM
16 years 14 days ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
CODES
2009
IEEE
15 years 10 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
97
Voted
WOSP
2004
ACM
15 years 8 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...