Sciweavers

24421 search results - page 4730 / 4885
» Communicating Complex Systems
Sort
View
141
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Teamwork is the heart of technology
IAT Services, the central Information Technology group at the University of Missouri-Columbia, operates computing sites in general access, classroom, and residence hall settings. ...
Tammy Hohlt, Kristina A. Cunningham
146
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Teaching with technology, setting an example
Providing instructional technology support for faculty requires a range of skills, from knowledge of software and hardware, to an ability to communicate, teach workshops, and rela...
Trevor Murphy, Mika Hirai
128
Voted
WSNA
2003
ACM
15 years 8 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
151
Voted
CCS
2003
ACM
15 years 8 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
125
Voted
CCS
2003
ACM
15 years 8 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
« Prev « First page 4730 / 4885 Last » Next »