Sciweavers

4 search results - page 1 / 1
» The Open Source approach opportunities and limitations with ...
Sort
View
COMPSEC
2002
134views more  COMPSEC 2002»
13 years 4 months ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...
EUROSEC
2010
ACM
13 years 11 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 4 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
SECPERU
2006
IEEE
13 years 10 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos