Sciweavers

1266 search results - page 225 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CCS
2003
ACM
14 years 1 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
OOPSLA
2010
Springer
13 years 6 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu
VLDB
2001
ACM
97views Database» more  VLDB 2001»
14 years 26 days ago
Functional Properties of Information Filtering
In recent years, due to the increasing popularization of data broadcasting, the volume and variety of data being broadcast are rapidly increasing. In this environment, as it is di...
Rie Sawai, Masahiko Tsukamoto, Yin-Huei Loh, Tsuto...
PERCOM
2005
ACM
14 years 8 months ago
Adaptive Temporal Radio Maps for Indoor Location Estimation
In this paper, we present a novel method to adapt the temporal radio maps for indoor location determination by offsetting the variational environmental factors using data mining t...
Jie Yin, Qiang Yang, Lionel M. Ni
SIGCOMM
2005
ACM
14 years 2 months ago
Improving accuracy in end-to-end packet loss measurement
Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active ...
Joel Sommers, Paul Barford, Nick G. Duffield, Amos...