Sciweavers

Share
7 search results - page 1 / 2
» Adversarial exploits of end-systems adaptation dynamics
Sort
View
JPDC
2007
117views more  JPDC 2007»
9 years 6 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
ICN
2009
Springer
10 years 1 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
ICDCS
2007
IEEE
9 years 10 months ago
GeoGrid: A Scalable Location Service Network
This paper presents GeoGrid, a geographical location service overlay network system, for providing scalable location-based services to a large and growing number of mobile users. ...
Jianjun Zhang, Gong Zhang, Ling Liu
INFOCOM
2007
IEEE
10 years 1 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
ATAL
2015
Springer
4 years 2 months ago
Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals
Police patrols are used ubiquitously to deter crimes in urban areas. A distinctive feature of urban crimes is that criminals react opportunistically to patrol officers’ assignm...
Chao Zhang, Arunesh Sinha, Milind Tambe
books