Sciweavers

1227 search results - page 89 / 246
» The Challenges of Application Service Hosting
Sort
View
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
15 years 10 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
158
Voted
LISA
2008
15 years 5 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong
139
Voted
ICNP
1998
IEEE
15 years 7 months ago
QGMA: A New MAC Protocol for Supporting QoS in Wireless Local Area Networks
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
Yi Ye, Chao-Ju Hou, Ching-Chih Han
140
Voted
RTSS
1998
IEEE
15 years 7 months ago
Design and Implementation of a Real-Time ATM-Based Protocol Server
This paper describes design and implementation of L ATM, an ATM (Asynchronous Transfer Mode) based networking server. While ATM emphasizes deterministic highspeed communication, a...
Martin Borriss, Hermann Härtig
101
Voted
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 3 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin