Sciweavers

94 search results - page 19 / 19
» Losing control of the internet: using the data plane to atta...
Sort
View
OSN
2008
109views more  OSN 2008»
13 years 5 months ago
A non-competing hybrid optical burst switch architecture for QoS differentiation
In this paper, we present a new hybrid optical burst switch architecture (HOBS) that takes advantage of the pre-transmission idle time during lightpath establishment. In dynamic c...
Kyriakos Vlachos, Kostas Ramantas
TITB
2010
128views Education» more  TITB 2010»
13 years 1 days ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
CCS
2005
ACM
13 years 11 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
CCS
2007
ACM
13 years 11 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...