Sciweavers

908 search results - page 140 / 182
» From communication networks to fuzzy sets
Sort
View
WWW
2006
ACM
16 years 15 days ago
Safeguard against unicode attacks: generation and applications of UC-simlist
A severe potential security problem in utilization of Unicode in the Web is identified, which is resulted from the fact that there are many similar characters in the Unicode Chara...
Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin
HPDC
2008
IEEE
15 years 6 months ago
Resource tracking in parallel and distributed applications
In this paper, we introduce the Join-Elect-Leave (JEL) model, a simple yet powerful model for tracking the resources participating in an application. This model is based on the co...
Niels Drost, Rob van Nieuwpoort, Jason Maassen, He...
VTC
2007
IEEE
121views Communications» more  VTC 2007»
15 years 6 months ago
Characterization of the ORBIT Indoor Testbed Radio Environment
— We perform a set of measurements of channel frequency responses at different points in the room that accommodates the ORBIT indoor testbed using a vector network analyzer (VNA)...
Haris Kremo, Jing Lei, Ivan Seskar, Larry J. Green...
CLUSTER
2006
IEEE
15 years 5 months ago
TGrid - Grid runtime support for hierarchically structured task-parallel programs
In this article we introduce a grid runtime system called TGrid which is designed to run hierarchically structured task-parallel programs on heterogenous environments and can also...
Sascha Hunold, Thomas Rauber, Gudula Rünger
LCN
2006
IEEE
15 years 5 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...