Sciweavers

1816 search results - page 281 / 364
» Trace oblivious computation
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
SIGMETRICS
2009
ACM
140views Hardware» more  SIGMETRICS 2009»
14 years 3 months ago
Maximum likelihood estimation of the flow size distribution tail index from sampled packet data
In the context of network traffic analysis, we address the problem of estimating the tail index of flow (or more generally of any group) size distribution from the observation of...
Patrick Loiseau, Paulo Gonçalves, Sté...
ISPASS
2008
IEEE
14 years 3 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
MUE
2008
IEEE
116views Multimedia» more  MUE 2008»
14 years 3 months ago
A Novel Technique for Real-Time Internet Radio Recorder on Non-DSP Embedded System
The capability of providing real-time multimedia player over the Internet is an important future application for embedded system. However, the main challenge of such an applicatio...
Lain-Jing Hwang, Chien-Chou Shih, I-Ting Kuo
SRDS
2008
IEEE
14 years 3 months ago
Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols
Large-scale distributed systems are subject to churn, i.e., continuous arrival, departure and failure of processes. Analysis of protocols under churn requires one to use churn mod...
Steven Y. Ko, Imranul Hoque, Indranil Gupta