Sciweavers

461 search results - page 54 / 93
» Protecting Transportation Infrastructure
Sort
View
CN
2004
106views more  CN 2004»
13 years 9 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
COMPUTER
2004
90views more  COMPUTER 2004»
13 years 9 months ago
Power and Energy Management for Server Systems
Power and energy consumption are key concerns for Internet data centers. These centers house hundreds, sometimes thousands, of servers and supporting cooling infrastructures. Rese...
Ricardo Bianchini, Ramakrishnan Rajamony
CCS
2009
ACM
14 years 4 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
14 years 3 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
MHCI
2005
Springer
14 years 3 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen