Sciweavers

3486 search results - page 665 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
CCS
2005
ACM
14 years 1 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
INFOCOM
2000
IEEE
14 years 2 days ago
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...
IPPS
2008
IEEE
14 years 2 months ago
A study of master-slave approaches to parallelize NSGA-II
Many of the optimization problems from the real world are multiobjective in nature, and the reference algorithm for multiobjective optimization is NSGA-II. Frequently, these probl...
Juan José Durillo, Antonio J. Nebro, Franci...
CASCON
1996
116views Education» more  CASCON 1996»
13 years 9 months ago
Measurements of DCE RPC performance in an OS/2 environment
Developing and managing applications for environments consisting of independently con gured computing systems interoperating acrossnetwork connections is of considerable interest ...
Ying Sun, Rick Bunt, Gregory M. Oster
CCS
2009
ACM
14 years 2 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...