Sciweavers

2503 search results - page 354 / 501
» Building Computer Network Attacks
Sort
View
111
Voted
IMC
2005
ACM
15 years 8 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
139
Voted
AIS
2006
Springer
15 years 2 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
149
Voted
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 5 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
121
Voted
NETGAMES
2004
ACM
15 years 8 months ago
Implementation of a service platform for online games
Large-scale multiplayer online games require considerable investment in hosting infrastructures. However, the difficulty of predicting the success of a new title makes investing ...
Anees Shaikh, Sambit Sahu, Marcel-Catalin Rosu, Mi...
107
Voted
GC
2004
Springer
15 years 8 months ago
Mobile UML Statecharts with Localities
In this paper an extension of a behavioural subset of UML statecharts for mobile computations is proposed. We study collections of UML objects whose behaviour is given by statechar...
Diego Latella, Mieke Massink, Hubert Baumeister, M...