Sciweavers

2503 search results - page 302 / 501
» Building Computer Network Attacks
Sort
View
CONEXT
2010
ACM
14 years 11 months ago
SecondNet: a data center network virtualization architecture with bandwidth guarantees
In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers becaus...
Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Y...
101
Voted
NDSS
2008
IEEE
15 years 8 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
106
Voted

Publication
262views
16 years 6 months ago
Attribute Multiset Grammars for Global Explanations of Activities
Recognizing multiple interleaved activities in a video requires implicitly partitioning the detections for each activity. Furthermore, constraints between activities are important ...
Dima Damen, David Hogg
IWEC
2007
15 years 3 months ago
A Survey on Projector-Based PC Clustered Distributed-Rendering Large Screen Displays and Techniques
Large screen display systems are common display systems nowadays. Especially projector-based PC cluster large screen display systems share most of large screen display system marke...
Munjae Song, Seongwon Park
UAI
2008
15 years 3 months ago
Sensitivity analysis in decision circuits
Decision circuits have been developed to perform efficient evaluation of influence diagrams [Bhattacharjya and Shachter, 2007], building on the advances in arithmetic circuits for...
Debarun Bhattacharjya, Ross D. Shachter