Sciweavers

972 search results - page 188 / 195
» presence 2007
Sort
View
CCS
2007
ACM
14 years 1 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
GRID
2007
Springer
14 years 1 months ago
Optimizing multiple queries on scientific datasets with partial replicas
We propose strategies to efficiently execute a query workload, which consists of multiple related queries submitted against a scientific dataset, on a distributed-memory system in...
Li Weng, Ümit V. Çatalyürek, Tahs...
ICC
2007
IEEE
168views Communications» more  ICC 2007»
14 years 1 months ago
Centralized Radio Resource Allocation for OFDMA Cellular Systems
Efficient resource allocation in cellular OFDMA systems envisages the assignment of the number of subcarriers and the relative transmission format on the basis of the experimented ...
Andrea Abrardo, Alessandro Alessio, Paolo Detti, M...
ICDCS
2007
IEEE
14 years 1 months ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
ICDM
2007
IEEE
148views Data Mining» more  ICDM 2007»
14 years 1 months ago
Sample Selection for Maximal Diversity
The problem of selecting a sample subset sufficient to preserve diversity arises in many applications. One example is in the design of recombinant inbred lines (RIL) for genetic a...
Feng Pan, Adam Roberts, Leonard McMillan, David Th...