Sciweavers

274 search results - page 22 / 55
» corr 2004
Sort
View
CORR
2004
Springer
68views Education» more  CORR 2004»
13 years 9 months ago
NoSEBrEaK - Attacking Honeynets
It is usually assumed that Honeynets are hard to detect and that attempts to detect or disable them can be unconditionally monitored. We scrutinize this assumption and demonstrate ...
Maximillian Dornseif, Thorsten Holz, Christian N. ...
CORR
2004
Springer
99views Education» more  CORR 2004»
13 years 9 months ago
Performance Analysis of the Globus Toolkit Monitoring and Discovery Service, MDS2
Monitoring and information services form a key component of a distributed system, or Grid. A quantitative study of such services can aid in understanding the performance limitatio...
Xuehai Zhang, Jennifer M. Schopf
CORR
2004
Springer
111views Education» more  CORR 2004»
13 years 9 months ago
Coloring Meyniel graphs in linear time
A Meyniel graph is a graph in which every odd cycle of length at least five has two chords. We present a linear-time algorithm that colors optimally the vertices of a Meyniel grap...
Benjamin Lévêque, Frédé...
CORR
2004
Springer
136views Education» more  CORR 2004»
13 years 9 months ago
On Global Warming (Softening Global Constraints)
We describe soft versions of the global cardinality constraint and the regular constraint, with efficient filtering algorithms maintaining domain consistency. For both constraints,...
Willem Jan van Hoeve, Gilles Pesant, Louis-Martin ...
CORR
2004
Springer
83views Education» more  CORR 2004»
13 years 9 months ago
A Comparison of Cryptography Courses
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and comput...
Joshua Holden