Sciweavers

312 search results - page 61 / 63
» Operational experiences with high-volume network intrusion d...
Sort
View
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 4 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
IMC
2010
ACM
13 years 4 months ago
Speed testing without speed tests: estimating achievable download speed from passive measurements
How fast is the network? The speed at which real users can download content at different locations and at different times is an important metric for service providers. Knowledge o...
Alexandre Gerber, Jeffrey Pang, Oliver Spatscheck,...
EUC
2007
Springer
14 years 1 months ago
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems
Networked embedded systems present unique challenges for system designers composing distributed applications with dyanmic, real-time, and resilience requirements. We consider the ...
Binoy Ravindran, Edward Curley, Jonathan Stephen A...
CBMS
2009
IEEE
14 years 1 months ago
Enabling effective curation of cancer biomarker research data
The dramatic increase in data in the area of cancer research has elevated the importance of effectively managing the quality and consistency of research results from multiple prov...
Andrew F. Hart, Chris Mattmann, John J. Tran, Dani...
MOBISYS
2010
ACM
13 years 9 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...