Sciweavers

247 search results - page 43 / 50
» Worm anatomy and model
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
JCO
2006
67views more  JCO 2006»
13 years 7 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
NAR
2000
93views more  NAR 2000»
13 years 7 months ago
Olfactory Receptor Database: a sensory chemoreceptor resource
The Olfactory Receptor Database (ORDB) is a WWWaccessible database that has been expanded from an olfactory receptor resource to a chemoreceptor resource. It stores data on six cl...
Emmanouil Skoufos, Luis N. Marenco, Prakash M. Nad...
INFOCOM
2011
IEEE
12 years 11 months ago
Network-aware behavior clustering of Internet end hosts
Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
Kuai Xu, Feng Wang 0002, Lin Gu
ADL
1998
Springer
189views Digital Library» more  ADL 1998»
13 years 11 months ago
Semantic Relations in a Medical Digital Library
ct In this paper, we describe the VesaliusTM Project, a multi-modal collection of anatomical resourcesunder development at Columbia University. 1 Our focus is on the need for navig...
Nina Wacholder, Celina Imielinska, Judith Klavans,...