Sciweavers

4305 search results - page 791 / 861
» The Test of Time
Sort
View
GLOBECOM
2009
IEEE
15 years 11 months ago
Evaluating DoS Attacks against Sip-Based VoIP Systems
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...
M. Zubair Rafique, M. Ali Akbar, Muddassar Farooq
ICAC
2009
IEEE
15 years 11 months ago
Ranking the importance of alerts for problem determination in large computer systems
The complexity of large computer systems has raised unprecedented challenges for system management. In practice, operators often collect large volume of monitoring data from system...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira, Akhil...
ICIG
2009
IEEE
15 years 11 months ago
Image Segmentation Via Iterative Geodesic Averaging
We present a simple and fast method for performing unsupervised segmentation. Our method works by centering a square window on each pixel of the input image. Each pixel is then as...
Asmaa Hosni, Michael Bleyer, Margrit Gelautz
ICST
2009
IEEE
15 years 11 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
IEEEPACT
2009
IEEE
15 years 11 months ago
Soft-OLP: Improving Hardware Cache Performance through Software-Controlled Object-Level Partitioning
—Performance degradation of memory-intensive programs caused by the LRU policy’s inability to handle weaklocality data accesses in the last level cache is increasingly serious ...
Qingda Lu, Jiang Lin, Xiaoning Ding, Zhao Zhang, X...