Sciweavers

1630 search results - page 303 / 326
» Semantic relatedness in semantic networks
Sort
View
CSFW
2009
IEEE
14 years 3 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
MUE
2007
IEEE
102views Multimedia» more  MUE 2007»
14 years 2 months ago
Ubiquitous Multimedia Information Delivering Service for Smart Home
In ubiquitous computing environments like smart home, residents can conveniently enjoy various home entertainments, such as watching TV, listening music, etc, through invisible an...
Jenq-Muh Hsu, Wei-Juing Wu, I-Ray Chang
CCS
2007
ACM
14 years 2 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
ICNP
2006
IEEE
14 years 2 months ago
Differentiated BGP Update Processing for Improved Routing Convergence
— Internet routers today can be overwhelmed by a large number of BGP updates triggered by events such as session resets, link failures, and policy changes. Such excessive updates...
Wei Sun, Zhuoqing Morley Mao, Kang G. Shin
NETGAMES
2006
ACM
14 years 2 months ago
Applying database replication to multi-player online games
Multi-player Online Games (MOGs) have emerged as popular data intensive applications in recent years. Being used by many players simultaneously, they require a high degree of faul...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...