Sciweavers

51 search results - page 3 / 11
» imcs 2010
Sort
View
IMCS
2010
76views more  IMCS 2010»
13 years 3 months ago
Human-Related Problems of Information Security in East African Cross-Cultural Environments
Purpose – The purposes of this paper are to find what kinds of problems, while implementing information security policy, may take place in foreign companies in the East African ...
Tatsuo Asai, Ms. Aline Uwera Hakizabera
IMC
2010
ACM
13 years 3 months ago
Scamper: a scalable and extensible packet prober for active measurement of the internet
Large scale active measurement of the Internet requires appropriate software support. The better tools that we have for executing consistent and systematic measurements, the more ...
Matthew J. Luckie
IMC
2010
ACM
13 years 3 months ago
High speed network traffic analysis with commodity multi-core systems
Multi-core systems are the current dominant trend in computer processors. However, kernel network layers often do not fully exploit multi-core architectures. This is due to issues...
Francesco Fusco, Luca Deri
IMC
2010
ACM
13 years 3 months ago
Measuring the mixing time of social graphs
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim
IMC
2010
ACM
13 years 3 months ago
Selecting representative IP addresses for internet topology studies
An Internet hitlist is a set of addresses that cover and can represent the the Internet as a whole. Hitlists have long been used in studies of Internet topology, reachability, and...
Xun Fan, John Heidemann