Sciweavers

950 search results - page 21 / 190
» presence 2008
Sort
View
SIGMETRICS
2008
ACM
13 years 9 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar
SIGMETRICS
2008
ACM
13 years 9 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
DFT
2008
IEEE
149views VLSI» more  DFT 2008»
13 years 11 months ago
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various count...
Francesco Regazzoni, Thomas Eisenbarth, Luca Breve...
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 11 months ago
Mining Approximate Order Preserving Clusters in the Presence of Noise
Subspace clustering has attracted great attention due to its capability of finding salient patterns in high dimensional data. Order preserving subspace clusters have been proven to...
Mengsheng Zhang, Wei Wang 0010, Jinze Liu
EDBT
2008
ACM
137views Database» more  EDBT 2008»
14 years 9 months ago
Data exchange in the presence of arithmetic comparisons
Data exchange is the problem of transforming data structured under a schema (called source) into data structured under a different schema (called target). The emphasis of data exc...
Foto N. Afrati, Chen Li, Vassia Pavlaki