Sciweavers

461 search results - page 84 / 93
» Bounds for Validation
Sort
View
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 4 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
74
Voted
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 4 months ago
Performance Analysis of a Middleware Demultiplexing Pattern
A key enabler of the recently adopted, assemblycentric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reusable building ...
U. Praphamontripong, Swapna S. Gokhale, Aniruddha ...
MSS
2007
IEEE
105views Hardware» more  MSS 2007»
15 years 4 months ago
Quota enforcement for high-performance distributed storage systems
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
IMSCCS
2006
IEEE
15 years 3 months ago
Combining Comparative Genomics with de novo Motif Discovery to Identify Human Transcription Factor DNA-Binding Motifs
Background: As more and more genomes are sequenced, comparative genomics approaches provide a methodology for identifying conserved regulatory elements that may be involved in gen...
Linyong Mao, W. Jim Zheng
107
Voted
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 3 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...