Sciweavers

248 search results - page 37 / 50
» Characterizing a spam traffic
Sort
View
WWW
2008
ACM
15 years 10 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CCS
2011
ACM
13 years 9 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
ICIAP
2003
ACM
15 years 9 months ago
An efficient vehicle queue detection system based on image processing
This paper describes a method for the real-time measurement of vehicle queue parameters in a video-based traffic monitoring experimental system. The method proposed here is based ...
Michele Zanin, Stefano Messelodi, Carla Maria Mode...
INFOCOM
1996
IEEE
15 years 1 months ago
Network Algorithms and Protocol for Multimedia Servers
In this paper, we present a network service specifically designed for multimedia servers. It uses a histogram based traffic characterization and an overload control protocol to el...
Pawan Goyal, Harrick M. Vin
ONDM
2007
14 years 11 months ago
Mutual Impact of Physical Impairments and Grooming in Multilayer Networks
In both, metropolitan optical networks (MON) and long haul optical networks (LHON) the signal quality is often influenced by the physical impairments, therefore a proper impairment...
Zsigmond Szilárd, Gábor Német...