Sciweavers

1534 search results - page 100 / 307
» networks 2011
Sort
View
DSN
2011
IEEE
14 years 3 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
DIMVA
2011
14 years 7 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner
ICASSP
2011
IEEE
14 years 7 months ago
Towards improving network flow watermarks using the repeat-accumulate codes
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
Amir Houmansadr, Nikita Borisov
159
Voted
OL
2011
177views Neural Networks» more  OL 2011»
14 years 7 months ago
Exploiting vector space properties to strengthen the relaxation of bilinear programs arising in the global optimization of proce
In this paper we present a methodology for finding tight convex relaxations for a special set of quadratic constraints given by bilinear and linear terms that frequently arise in ...
Juan P. Ruiz, Ignacio E. Grossmann
AROBOTS
2011
14 years 11 months ago
Setpoint regulation for stochastically interacting robots
— We present an integral feedback controller that regulates the average copy number of a particular assembly in a system of stochastically interacting robots. The mathematical mo...
Nils Napp, Samuel Burden, Eric Klavins