Sciweavers

3751 search results - page 674 / 751
» Events in security protocols
Sort
View
OSDI
1994
ACM
14 years 11 months ago
Metadata Update Performance in File Systems
Structural changes, such as file creation and block allocation, have consistently been identified as file system performance problems in many user environments. We compare several...
Gregory R. Ganger, Yale N. Patt
CCR
2006
76views more  CCR 2006»
14 years 10 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
GRID
2006
Springer
14 years 9 months ago
Snapshot Processing in Streaming Environments
Monitoring and correlation of streaming data from multiple sources is becoming increasingly important in many application areas. Example applications include automated commodities...
Daniel M. Zimmerman, K. Mani Chandy
IJISEC
2006
106views more  IJISEC 2006»
14 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
PERVASIVE
2008
Springer
14 years 9 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...