Sciweavers

2414 search results - page 330 / 483
» Computing Normal Subgroups
Sort
View
CCECE
2006
IEEE
15 years 4 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...
109
Voted
CW
2006
IEEE
15 years 4 months ago
An Interactive Mixed Reality Framework for Virtual Humans
In this paper, we present a simple and robust Mixed Reality (MR) framework that allows for real-time interaction with Virtual Humans in real and virtual environments under consist...
Arjan Egges, George Papagiannakis, Nadia Magnenat-...
DSN
2006
IEEE
15 years 4 months ago
R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource Pools
— We consider shared resource pool management taking into account per-application quality of service (QoS) requirements and server failures. Application QoS requirements are deļ¬...
Ludmila Cherkasova, Jerome A. Rolia
DSN
2006
IEEE
15 years 4 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
85
Voted
ICDCSW
2006
IEEE
15 years 4 months ago
Characterization of a Connectivity Measure for Sparse Wireless Multi-hop Networks
The extent to which a wireless multi-hop network is connected is usually measured by the probability that all the nodes form a single connected component. We find this measure, c...
Srinath Perur, Sridhar Iyer