Sciweavers

120 search results - page 24 / 24
» Modeling Malware Spreading Dynamics
Sort
View
BROADNETS
2004
IEEE
13 years 8 months ago
The Effects of the Sub-Carrier Grouping on Multi-Carrier Channel Aware Scheduling
Channel-aware scheduling and link adaptation (LA) methods are widely considered to be crucial for realizing high data rates in wireless networks. Multi-carrier systems that spread...
Fanchun Jin, Gokhan Sahin, Amrinder Arora, Hyeong-...
EUROSYS
2008
ACM
14 years 2 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
13 years 9 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 6 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
WCE
2007
13 years 6 months ago
An Improved Sparge Pipe Air Distribution System for a Fluidised Bed Combustor
The purpose of the air distribution system in a fluidised bed combustor is to provide a reasonably uniform spread of combustion air over the entire horizontal cross-sectional area...
D. R. Garwood, J. Ward, D. R. Bowen, M. Fisher, D....