Sciweavers

2269 search results - page 394 / 454
» Query Incentive Networks
Sort
View
DSN
2005
IEEE
14 years 4 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ICDCSW
2005
IEEE
14 years 4 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
KES
2005
Springer
14 years 4 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
VLDB
2005
ACM
140views Database» more  VLDB 2005»
14 years 4 months ago
MINERVA: Collaborative P2P Search
This paper proposes the live demonstration of a prototype of MINERVA1 , a novel P2P Web search engine. The search engine is layered on top of a DHT-based overlay network that conn...
Matthias Bender, Sebastian Michel, Peter Triantafi...
ICNP
2003
IEEE
14 years 4 months ago
Packet Classification Using Extended TCAMs
CAMs are the most popular practical method for implementing packet classification in high performance routers. Their principal drawbacks are high power consumption and inefficient...
Ed Spitznagel, David E. Taylor, Jonathan S. Turner