Sciweavers

8655 search results - page 529 / 1731
» Challenges for Trusted Computing
Sort
View
147
Voted
NSDI
2010
15 years 6 months ago
Carousel: Scalable Logging for Intrusion Prevention Systems
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and...
Vinh The Lam, Michael Mitzenmacher, George Varghes...
IADIS
2003
15 years 6 months ago
Anti-Sniffing in Unbounded Networks
Along with the trend in networked computing environments towards largely unbounded network infrastructures, the traditional anti-sniffing issue meets a great challenge. This paper...
Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding
WOA
2000
15 years 6 months ago
OO Reactive Agents for RDM-Based Simulations
The computer simulation of complex phenomena is a challenging issue for studying their properties. Several models and techniques have been developed in order to provide useful con...
Stefania Bandini, Flavio De Paoli, Sara Manzoni, C...
150
Voted
ISMB
1996
15 years 6 months ago
Parameterization Studies for the SAM and HMMER Methods of Hidden Markov Model Generation
Multiple sequence alignment of distantly related viral proteins remains a challenge to all currently available alignment methods. The hidden Markovmodel approach offers a new,flex...
Marcella A. McClure, Chris Smith, Pete Elton
153
Voted
GECCO
2008
Springer
124views Optimization» more  GECCO 2008»
15 years 6 months ago
Ultra high frequency financial data
This note is best described as a ‘Research Challenge’, and concerns building an ultra high frequency (UHF) trading system. The emphasis is on addressing the problems posed by ...
Martin Victor Sewell, Wei Yan