Sciweavers

8135 search results - page 1519 / 1627
» network 2008
Sort
View
154
Voted
CCS
2008
ACM
15 years 5 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
122
Voted
CCS
2008
ACM
15 years 5 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
CCS
2008
ACM
15 years 5 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
165
Voted
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
15 years 5 months ago
A mathematical model of the Skype VoIP congestion control algorithm
The Internet is changing from being only an efficient platform for data delivery to become also a platform for audio/video applications. The stability of the traditional Internet i...
Luca De Cicco, Saverio Mascolo, Vittorio Palmisano
118
Voted
CHI
2008
ACM
15 years 5 months ago
Comparing access methods and quality of 3g mobile video streaming services
In this paper we examine the access methods and the quality of experience of current unicast video streaming services in 3G mobile networks. A packet-switched mobile video client,...
Marcin Davies, Antitza Dantcheva, Peter Fröhl...
« Prev « First page 1519 / 1627 Last » Next »