Sciweavers

785 search results - page 134 / 157
» Binary Join Trees
Sort
View
63
Voted
GLOBECOM
2006
IEEE
15 years 3 months ago
Building A Monitoring Overlay for Peer-to-Peer Streaming
— Current peer-to-peer (P2P) streaming systems often assume that nodes are cooperative to upload and download data. However, in the open environment of the Internet, this is not ...
Xing Jin, Qiuyan Xia, S.-H. Gary Chan
IMC
2006
ACM
15 years 3 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
SIGCSE
2006
ACM
148views Education» more  SIGCSE 2006»
15 years 3 months ago
Back to basics in CS1 and CS2
This paper describes a significant redesign of the introductory courses at the University of Washington that has led to increased enrollments, increased student satisfaction and a...
Stuart Reges
ARITH
2005
IEEE
15 years 3 months ago
Table Lookup Structures for Multiplicative Inverses Modulo 2k
We introduce an inheritance property and related table lookup structures applicable to simplified evaluation of the modular operations “multiplicative inverse”, “discrete l...
David W. Matula, Alex Fit-Florea, Mitchell Aaron T...
FCCM
2005
IEEE
102views VLSI» more  FCCM 2005»
15 years 3 months ago
A Signature Match Processor Architecture for Network Intrusion Detection
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). NIDSs are becoming critical components of the network infrastructu...
Janardhan Singaraju, Long Bu, John A. Chandy