Sciweavers

203 search results - page 19 / 41
» On the Placement of Internet Instrumentation
Sort
View
IPPS
2008
IEEE
14 years 4 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 3 months ago
Applying the Task-Technology Fit Model to WWW-based Procurement: Conceptualization and Measurement
This research examines the application of the tasktechnology fit (TTF) model to World Wide Web (WWW) usage for electronic commerce (EC) purposes. Conducted from corporate buyers...
Younes Benslimane, Michel Plaisent, Prosper Bernar...
JCS
2011
138views more  JCS 2011»
13 years 22 days ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
BROADNETS
2007
IEEE
14 years 4 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
CLUSTER
2002
IEEE
13 years 9 months ago
Location Selection for Active Services
Active services are application-specified programs that are executed inside the network. The location where the active service is executed plays an important role. The dynamic beha...
Roger Karrer, Thomas R. Gross