Sciweavers

5882 search results - page 1142 / 1177
» networks 2010
Sort
View
ICDCS
2010
IEEE
14 years 23 days ago
On the Impact of MIMO Diversity on Higher Layer Performance
Abstract—In this paper, we shed light on the cross-layer interactions between the PHY, link and routing layers in networks with MIMO links operating in the diversity mode. Many p...
Ece Gelal, Konstantinos Pelechrinis, Ioannis Brous...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 23 days ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
PODC
2010
ACM
14 years 22 days ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer
SIGIR
2010
ACM
14 years 22 days ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
SOUPS
2010
ACM
14 years 22 days ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
« Prev « First page 1142 / 1177 Last » Next »