Sciweavers

2503 search results - page 354 / 501
» Building Computer Network Attacks
Sort
View
IMC
2005
ACM
15 years 7 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
130
Voted
AIS
2006
Springer
15 years 1 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 4 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
NETGAMES
2004
ACM
15 years 7 months ago
Implementation of a service platform for online games
Large-scale multiplayer online games require considerable investment in hosting infrastructures. However, the difficulty of predicting the success of a new title makes investing ...
Anees Shaikh, Sambit Sahu, Marcel-Catalin Rosu, Mi...
96
Voted
GC
2004
Springer
15 years 7 months ago
Mobile UML Statecharts with Localities
In this paper an extension of a behavioural subset of UML statecharts for mobile computations is proposed. We study collections of UML objects whose behaviour is given by statechar...
Diego Latella, Mieke Massink, Hubert Baumeister, M...