Sciweavers

1951 search results - page 242 / 391
» Decoupling Change from Design
Sort
View
ICDCS
2009
IEEE
16 years 1 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
SBP
2010
Springer
15 years 11 months ago
Social Factors in Creating an Integrated Capability for Health System Modeling and Simulation
Abstract. The health system is a complex system of systems – changes in agriculture, transportation, economics, family life, medical practices, and many other things can have a p...
Paul P. Maglio, Melissa Cefkin, Peter J. Haas, Pat...
PADS
2009
ACM
15 years 11 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
CEC
2009
IEEE
15 years 10 months ago
Mobile processes, mobile channels and complex dynamic systems
— This paper explores a process-oriented approach to complex systems design, using massive fine-grained concurrency, mobile channels and mobile processes. The complex systems st...
Eric Bonnici, Peter H. Welch
GROUP
2009
ACM
15 years 10 months ago
Wikipedians are born, not made: a study of power editors on Wikipedia
Open content web sites depend on users to produce information of value. Wikipedia is the largest and most well-known such site. Previous work has shown that a small fraction of ed...
Katherine A. Panciera, Aaron Halfaker, Loren G. Te...