Sciweavers

1028 search results - page 182 / 206
» Using Attack Graphs to Design Systems
Sort
View
CCS
2008
ACM
13 years 10 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
FOCS
2002
IEEE
14 years 1 months ago
A Constant-Factor Approximation Algorithm for the Multicommodity
We present the first constant-factor approximation algorithm for network design with multiple commodities and economies of scale. We consider the rent-or-buy problem, a type of m...
Amit Kumar, Anupam Gupta, Tim Roughgarden
WWW
2004
ACM
14 years 9 months ago
Time-based contextualized-news browser (t-cnb)
We propose a new way of browsing contextualized-news articles. Our prototype browser system is called a Time-based ContextualizedNews Browser (T-CNB). The T-CNB concurrently and a...
Akiyo Nadamoto, Katsumi Tanaka
OSDI
2004
ACM
14 years 9 months ago
FFPF: Fairly Fast Packet Filters
FFPF is a network monitoring framework designed for three things: speed (handling high link rates), scalability (ability to handle multiple applications) and flexibility. Multiple...
Herbert Bos, Willem de Bruijn, Mihai-Lucian Criste...
SIGMOD
2007
ACM
187views Database» more  SIGMOD 2007»
14 years 8 months ago
P-ring: an efficient and robust P2P range index structure
Data availability, collection and storage have increased dramatically in recent years, raising new technological and algorithmic challenges for database design and data management...
Adina Crainiceanu, Prakash Linga, Ashwin Machanava...