Sciweavers

2503 search results - page 149 / 501
» Building Computer Network Attacks
Sort
View
WORM
2004
15 years 3 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
FTDCS
2004
IEEE
15 years 5 months ago
Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications
Peer-to-peer (P2P) networks and mobile ad hoc networks (MANET) share some key characteristics: selforganization and decentralization, and both need to solve the same fundamental p...
Lu Yan, Kaisa Sere, Xinrong Zhou, Jun Pang
FCCM
2007
IEEE
122views VLSI» more  FCCM 2007»
15 years 5 months ago
Reconfigurable Computing Cluster (RCC) Project: Investigating the Feasibility of FPGA-Based Petascale Computing
While medium- and large-sized computing centers have increasingly relied on clusters of commodity PC hardware to provide cost-effective capacity and capability, it is not clear th...
Ron Sass, William V. Kritikos, Andrew G. Schmidt, ...
INFOCOM
2011
IEEE
14 years 5 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
SC
2005
ACM
15 years 7 months ago
On the Feasibility of Optical Circuit Switching for High Performance Computing Systems
The interconnect plays a key role in both the cost and performance of large-scale HPC systems. The cost of future high-bandwidth electronic interconnects is expected to increase d...
Kevin J. Barker, Alan F. Benner, Raymond R. Hoare,...