Sciweavers

5882 search results - page 1141 / 1177
» networks 2010
Sort
View
IDA
2010
Springer
14 years 1 months ago
InfraWatch: Data Management of Large Systems for Monitoring Infrastructural Performance
Abstract. This paper introduces a new project, InfraWatch, that demonstrates the many challenges that a large complex data analysis application has to offer in terms of data captu...
Arno J. Knobbe, Hendrik Blockeel, Arne Koopman, To...
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
14 years 1 months ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
PET
2010
Springer
14 years 24 days ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
QOSA
2010
Springer
14 years 24 days ago
Validating Model-Driven Performance Predictions on Random Software Systems
Abstract. Software performance prediction methods are typically validated by taking an appropriate software system, performing both performance predictions and performance measurem...
Vlastimil Babka, Petr Tuma, Lubomír Bulej
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 23 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
« Prev « First page 1141 / 1177 Last » Next »