Sciweavers

87 search results - page 12 / 18
» The Use of Honeynets to Detect Exploited Systems Across Larg...
Sort
View
SIGCOMM
2003
ACM
14 years 26 days ago
A measurement-based analysis of multihoming
Multihoming has traditionally been employed by stub networks to enhance the reliability of their network connectivity. With the advent of commercial ā€œintelligent route controlā€...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
NCA
2008
IEEE
14 years 2 months ago
APART: Low Cost Active Replication for Multi-tier Data Acquisition Systems
This paper proposes APART (A Posteriori Active ReplicaTion), a novel active replication protocol speciļ¬cally tailored for multi-tier data acquisition systems. Unlike existing ac...
Paolo Romano, Diego Rughetti, Francesco Quaglia, B...
HUC
2010
Springer
13 years 7 months ago
Tasking networked CCTV cameras and mobile phones to identify and localize multiple people
We present a method to identify and localize people by leveraging existing CCTV camera infrastructure along with inertial sensors (accelerometer and magnetometer) within each pers...
Thiago Teixeira, Deokwoo Jung, Andreas Savvides
BMCBI
2008
100views more  BMCBI 2008»
13 years 7 months ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...
NSDI
2004
13 years 9 months ago
Path-Based Failure and Evolution Management
We present a new approach to managing failures and evolution in large, complex distributed systems using runtime paths. We use the paths that requests follow as e through the syst...
Mike Y. Chen, Anthony Accardi, Emre Kiciman, David...