Sciweavers

4276 search results - page 825 / 856
» Techniques for Empirical Validation
Sort
View
COMSWARE
2007
IEEE
14 years 24 days ago
On Configuring BGP Route Reflectors
The Border Gateway Protocol (BGP) is the standard protocol for exchanging routing information between border routers of Autonomous Systems (ASes) in today's Internet. Within a...
Yuri Breitbart, Minos N. Garofalakis, Anupam Gupta...
CIKM
2009
Springer
14 years 24 days ago
Blogger-centric contextual advertising
This paper addresses the concept of Blogger-Centric Contextual Advertising, which refers to the assignment of personal ads to any blog page, chosen in according to bloggers' ...
Teng-Kai Fan, Chia-Hui Chang
EATIS
2007
ACM
14 years 24 days ago
Exhaustif: a fault injection tool for distributed heterogeneous embedded systems
This paper presents a new fault injection tool called Exhaustif (Exhaustive Workbench for Systems Reliability). Exhaustif is a SWIFI fault injection tool for fault tolerance verif...
Antonio Dasilva, José-Fernán Mart&ia...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 23 days ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
ESORICS
2009
Springer
14 years 23 days ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...