Sciweavers

2380 search results - page 476 / 476
» Distributed detection in a large wireless sensor network
Sort
View
72
Voted
ACSAC
2006
IEEE
15 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
CN
2011
176views more  CN 2011»
14 years 1 months ago
Taming the elephants: New TCP slow start
Standard slow start does not work well under large bandwidthdelay product (BDP) networks. We find two causes of this problem in existing three popular operating systems, Linux, F...
Sangtae Ha, Injong Rhee
ETVC
2008
14 years 11 months ago
Abstracts of the LIX Fall Colloquium 2008: Emerging Trends in Visual Computing
s of the LIX Fall Colloquium 2008: Emerging Trends in Visual Computing Frank Nielsen Ecole Polytechnique, Palaiseau, France Sony CSL, Tokyo, Japan Abstract. We list the abstracts o...
Frank Nielsen
BMCBI
2010
135views more  BMCBI 2010»
14 years 9 months ago
Delineation of amplification, hybridization and location effects in microarray data yields better-quality normalization
Background: Oligonucleotide arrays have become one of the most widely used high-throughput tools in biology. Due to their sensitivity to experimental conditions, normalization is ...
Marc Hulsman, Anouk Mentink, Eugene P. van Someren...
ACSAC
2010
IEEE
14 years 7 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu