Sciweavers

390 search results - page 42 / 78
» A New Simulation Technique for Periodic Small-Signal Analysi...
Sort
View
CHI
1998
ACM
15 years 6 months ago
Visualizing the Evolution of Web Ecologies
Several visualizations have emerged which attempt to visualize all or part of the World Wide Web. Those visualizations, however, fail to present the dynamically changing ecology o...
Ed Huai-hsin Chi, James E. Pitkow, Jock D. Mackinl...
SIGCOMM
2003
ACM
15 years 7 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 7 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
JPDC
2008
122views more  JPDC 2008»
15 years 1 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...
EWSN
2006
Springer
16 years 1 months ago
On the Scalability of Routing Integrated Time Synchronization
Time synchronization is a crucial component of a large class of sensor network applications, traditionally implemented as a standalone middleware service that provides a virtual gl...
János Sallai, Branislav Kusy, Ákos L...