Sciweavers

2821 search results - page 26 / 565
» Tracing a single user
Sort
View
BROADBAND
1998
13 years 10 months ago
Blocking of dynamic multicast connections in a single link
In this paper, a method for calculating blocking experienced by dynamic multicast connections in a single link is presented. A service center at the root of a tree-type network pr...
Jouni Karvo, Jorma T. Virtamo, Samuli Aalto, Olli ...
FAST
2004
13 years 10 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
CN
2000
64views more  CN 2000»
13 years 9 months ago
Risks of the Passport single signon protocol
Passport is a protocol that enables users to sign onto many different merchants' web pages by authenticating themselves only once to a common server. This is important becaus...
David P. Kormann, Aviel D. Rubin
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 9 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
ICAC
2005
IEEE
14 years 2 months ago
Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata
Detection and diagnosis of faults in a large-scale distributed system is a formidable task. Interest in monitoring and using traces of user requests for fault detection has been o...
Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Ke...