Sciweavers

9219 search results - page 1791 / 1844
» Dynamics Modeling and Culling
Sort
View
ACSAC
2006
IEEE
15 years 7 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
BROADNETS
2006
IEEE
15 years 7 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
ICDCS
2006
IEEE
15 years 7 months ago
Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks
Distributed hash table (DHT) networks based on consistent hashing functions have an inherent load balancing problem. The problem becomes more severe due to the heterogeneity of ne...
Haiying Shen, Cheng-Zhong Xu
INFOCOM
2006
IEEE
15 years 7 months ago
JetMax: Scalable Max-Min Congestion Control for High-Speed Heterogeneous Networks
Recent surge of interest towards congestion control that relies on single-link feedback (e.g., XCP, RCP, MaxNet, EMKC, VCP), suggests that such systems may offer certain benefit...
Yueping Zhang, Derek Leonard, Dmitri Loguinov
INFOCOM
2006
IEEE
15 years 7 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
« Prev « First page 1791 / 1844 Last » Next »