Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
TDSC
2010
157views more  TDSC 2010»
10 years 5 months ago
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad...
Fei Xing, Wenye Wang
TDSC
2010
168views more  TDSC 2010»
10 years 5 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou
TDSC
2010
146views more  TDSC 2010»
10 years 5 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
TDSC
2010
101views more  TDSC 2010»
10 years 5 months ago
Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense o...
Mi Kyung Han, Lili Qiu
TDSC
2010
144views more  TDSC 2010»
10 years 5 months ago
On the Thermal Attack in Instruction Caches
The instruction cache has been recognized as one of the least hot units in microprocessors, which leaves the instruction cache largely ignored in onchip thermal management. Consequ...
Joonho Kong, Johnsy K. John, Eui-Young Chung, Sung...
TDSC
2010
172views more  TDSC 2010»
10 years 5 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
TDSC
2010
160views more  TDSC 2010»
10 years 5 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
TDSC
2010
119views more  TDSC 2010»
10 years 5 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
TDSC
2010
101views more  TDSC 2010»
10 years 8 months ago
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
—This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines ...
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan ...
TDSC
2010
111views more  TDSC 2010»
10 years 8 months ago
Using Underutilized CPU Resources to Enhance Its Reliability
—Soft errors (or Transient faults) are temporary faults that arise in a circuit due to a variety of internal noise and external sources such as cosmic particle hits. Though soft ...
Avi Timor, Avi Mendelson, Yitzhak Birk, Neeraj Sur...
books