Sciweavers

7607 search results - page 1446 / 1522
» informs 2006
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
IPCCC
2006
IEEE
14 years 3 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
IPCCC
2006
IEEE
14 years 3 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
IPPS
2006
IEEE
14 years 3 months ago
RAPID: an end-system aware protocol for intelligent data transfer over lambda grids
Next-generation e-Science applications will require the ability to transfer information at high data rates between distributed computing centers and data repositories. To support ...
Amitabha Banerjee, Wu-chun Feng, Biswanath Mukherj...
IPPS
2006
IEEE
14 years 3 months ago
A method to improve structural modeling based on conserved domain clusters
—Homology modeling requires an accurate alignment between a query sequence and its homologs with known three-dimensional (3D) information. Current structural modeling techniques ...
Fa Zhang, Lin Xu, Bo Yuan
« Prev « First page 1446 / 1522 Last » Next »