Sciweavers

1011 search results - page 197 / 203
» On the value of coordination in network design
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
PODC
2006
ACM
14 years 2 months ago
Sketching asynchronous streams over a sliding window
We study the problem of maintaining sketches of recent elements of a data stream. Motivated by applications involving network data, we consider streams that are asynchronous, in w...
Srikanta Tirthapura, Bojian Xu, Costas Busch
DSN
2005
IEEE
14 years 2 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
UIST
1993
ACM
14 years 16 days ago
VB2: An Architecture for Interaction in Synthetic Worlds
This paper describes the VB2 architecture for the construction of three-dimensional interactive applications. The system's state and behavior are uniformly represented as a n...
Enrico Gobbetti, Jean-Francis Balaguer, Daniel Tha...
JCM
2006
77views more  JCM 2006»
13 years 8 months ago
Promote the Use of Explicit Delay Control
The Internet is undergoing changes of its traffic mix, with the IP-based interactive multimedia applications gaining momentum. According to studies, UDP-based multimedia traffic ha...
Xiaoyuan Gu, Dirk Markwardt, Lars C. Wolf