Sciweavers

296 search results - page 58 / 60
» Television on the internet: new practices, new viewers
Sort
View
CCS
2005
ACM
14 years 2 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
KES
2004
Springer
14 years 1 months ago
Decision Support System on the Grid
Aero engines are extremely reliable machines and operational failures are rare. However, currently great effort is being put into reducing the number of in-flight engine shutdowns,...
Max Ong, Xiaoxu Ren, J. Allan, Visakan Kadirkamana...
MM
2003
ACM
118views Multimedia» more  MM 2003»
14 years 1 months ago
PROMISE: peer-to-peer media streaming using CollectCast
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan...
SIGCOMM
2003
ACM
14 years 1 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
EUROCRYPT
2003
Springer
14 years 1 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu