Sciweavers

4307 search results - page 413 / 862
» Dynamic Spyware Analysis
Sort
View
IACR
2011
128views more  IACR 2011»
14 years 4 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang

Publication
159views
14 years 13 days ago
Insights into Internet Memes
Internet memes are phenomena that rapidly gain popularity or notoriety on the Internet. Often, modifications or spoofs add to the profile of the original idea thus turning it into ...
C. Bauckhage
INFOCOM
2012
IEEE
13 years 7 months ago
An effective hop-by-hop Interest shaping mechanism for CCN communications
Abstract—We introduce a rate-based congestion control mechanism for Content-Centric Networking (CCN). It builds on the fact that one Interest retrieves at most one Data packet. C...
Natalya Rozhnova, Serge Fdida
INFOCOM
2012
IEEE
13 years 7 months ago
Delay and rate-optimal control in a multi-class priority queue with adjustable service rates
—We study two convex optimization problems in a multi-class M/G/1 queue with adjustable service rates: minimizing convex functions of the average delay vector, and minimizing ave...
Chih-Ping Li, Michael J. Neely
ICFP
2009
ACM
16 years 5 months ago
Non-parametric parametricity
Type abstraction and intensional type analysis are features seemingly at odds--type abstraction is intended to guarantee parametricity and representation independence, while type ...
Georg Neis, Derek Dreyer, Andreas Rossberg