Sciweavers

1639 search results - page 240 / 328
» Degree-constrained network flows
Sort
View
122
Voted
DSN
2007
IEEE
15 years 4 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
CCR
1999
92views more  CCR 1999»
15 years 11 days ago
YESSIR: a simple reservation mechanism for the Internet
Abstract-RSVP has been designed to support resource reservation in the Internet. However, it has two major problems: complexity and scalability. The former results in large message...
Ping Pan, Henning Schulzrinne
WWW
2004
ACM
16 years 1 months ago
Information diffusion through blogspace
We study the dynamics of information propagation in environments of low-overhead personal publishing, using a large collection of weblogs over time as our example domain. We chara...
Daniel Gruhl, Ramanathan V. Guha, David Liben-Nowe...
PERCOM
2004
ACM
16 years 8 days ago
"Yoking-Proofs" for RFID Tags
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
Ari Juels
ICDCSW
2006
IEEE
15 years 6 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy