Sciweavers

35 search results - page 6 / 7
» ipccc 2007
Sort
View
IPCCC
2007
IEEE
13 years 11 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
IPCCC
2007
IEEE
13 years 11 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
IPCCC
2007
IEEE
13 years 11 months ago
O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks
In this paper, we study the Maximum lifetime Target Coverage problem (MTC), which is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. ...
My T. Thai, Yingshu Li, Feng Wang 0002
IPCCC
2007
IEEE
13 years 11 months ago
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture
— Recently, there has been increased interest, shown by the research community and by industry fora, to enable emergency services for voice-over-IP based architectures. In order ...
Hannes Tschofenig, Henning Schulzrinne, Murugaraj ...
IPCCC
2007
IEEE
13 years 11 months ago
Ensuring Performance in Activity-Based File Relocation
Dynamic Storage Tiering (DST) is the concept of grouping storage devices into tiers based on their characteristics, and relocating files dynamically to leverage on the heterogene...
Joel C. Wu, Bo Hong, Scott A. Brandt