Sciweavers

257 search results - page 44 / 52
» Comparison of Web Server Architectures: A Measurement Study
Sort
View
65
Voted
IMC
2009
ACM
15 years 4 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
102
Voted
JNCA
2011
126views more  JNCA 2011»
14 years 4 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou
MOBICOM
2004
ACM
15 years 3 months ago
Choosing beacon periods to improve response times for wireless HTTP clients
The IEEE 802.11 wireless LAN standard power-saving mode (PSM) allows the network interface card (NIC) to periodically sleep between receiving data. In this paper, we show that 802...
Suman Nath, Zachary R. Anderson, Srinivasan Seshan
RAID
2010
Springer
14 years 8 months ago
Fast-Flux Bot Detection in Real Time
The fast-flux service network architecture has been widely adopted by bot herders to increase the productivity and extend the lifespan of botnets’ domain names. A fast-flux bot...
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
BMCBI
2011
14 years 4 months ago
iPhy: an integrated phylogenetic workbench for supermatrix analyses
Background: The increasing availability of molecular sequence data means that the accuracy of future phylogenetic studies is likely to by limited by systematic bias and taxon choi...
Martin O. Jones, Georgios D. Koutsovoulos, Mark L....