Sciweavers

1733 search results - page 294 / 347
» Self-Similarity in File Systems
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
Proportional Replication in Peer-to-Peer Networks
— We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages....
Saurabh Tewari, Leonard Kleinrock
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
14 years 3 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
SAC
2006
ACM
14 years 3 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
DSN
2005
IEEE
14 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ICAS
2005
IEEE
85views Robotics» more  ICAS 2005»
14 years 3 months ago
Supporting Consistency Management in Dynamic Content Distribution Overlays
Content Distribution Overlays improves end-user performance by replicating Web contents on a group of geographically distributed sites interconnected over the Internet. However, w...
Zhou Su, Jiro Katto, Yasuhiko Yasuda