Sciweavers

9316 search results - page 123 / 1864
» Analysis of traceback techniques
Sort
View
159
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Reduction-based analysis of BGP systems with BGPVerif
Today’s inter-domain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfiguration by individual autonomous system...
Anduo Wang, Alexander J. T. Gurney, Xianglong Han,...
162
Voted
ISSTA
2012
ACM
13 years 6 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
160
Voted
PAMI
2012
13 years 6 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
149
Voted
KBSE
2010
IEEE
15 years 1 months ago
An experience report on scaling tools for mining software repositories using MapReduce
The need for automated software engineering tools and techniques continues to grow as the size and complexity of studied systems and analysis techniques increase. Software enginee...
Weiyi Shang, Bram Adams, Ahmed E. Hassan
104
Voted
SIGMETRICS
1999
ACM
15 years 8 months ago
Improving Performance of Data Analysis in Data Warehouses: A Methodology and Case Study
Data analysis in very large databases requires innovative techniques. In an exploration and discovery scenario, the performance of standard SQL techniques can be unacceptable. Thi...
Janet Siebert