Sciweavers

273 search results - page 38 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 12 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
RAID
2005
Springer
15 years 5 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
MIDDLEWARE
2007
Springer
15 years 5 months ago
Using checkpointing to recover from poor multi-site parallel job scheduling decisions
Recent research in multi-site parallel job scheduling leverages user-provided estimates of job communication characteristics to effectively partition the job across multiple clus...
William M. Jones
97
Voted
IWCMC
2010
ACM
15 years 4 months ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
MOBIHOC
2002
ACM
15 years 11 months ago
On using the ad-hoc network model in cellular packet data networks
While several approaches have been proposed in literature for improving the performance of wireless packet data networks, a recent class of approaches has focused on improving the...
Hung-Yun Hsieh, Raghupathy Sivakumar