Sciweavers

3123 search results - page 533 / 625
» Community Cloud Computing
Sort
View
WINET
2010
129views more  WINET 2010»
15 years 2 months ago
Characterizing 802.11 wireless link behavior
Since wireless signals propagate through the ether, they are significantly affected by attenuation, fading, multipath, and interference. As a result, it is difficult to measure ...
Glenn Judd, Peter Steenkiste
ACSAC
2010
IEEE
15 years 2 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
GIS
2010
ACM
15 years 2 months ago
Kernelized map matching
Map matching is a fundamental operation in many applications such as traffic analysis and location-aware services, the killer apps for ubiquitous computing. In the past, several m...
Ahmed Jawad, Kristian Kersting
SIN
2010
ACM
15 years 2 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
TMA
2010
Springer
183views Management» more  TMA 2010»
15 years 2 months ago
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers
In the last few years the research community has proposed several techniques for network traffic classification. While the performance of these methods is promising especially for ...
Alessandro Finamore, Michela Meo, Dario Rossi, Sil...