Sciweavers

9719 search results - page 1712 / 1944
» Inference for Multiplicative Models
Sort
View
RAID
2005
Springer
15 years 9 months ago
Anomalous Payload-Based Worm Detection and Signature Generation
New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect and generate signatures for zero-day worms. Experimental evidence demonstrates tha...
Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 9 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
ACMICEC
2004
ACM
160views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
A shared service terminology for online service provisioning
An extensive literature research in the fields of IT and business science reveals that service-related terms as service and e-service have multiple interpretations within busines...
Ziv Baida, Jaap Gordijn, Borys Omelayenko
CSCW
2004
ACM
15 years 9 months ago
Return on investment and organizational adoption
This paper considers the complexity of measuring the return on investment for technology adoption. A brief case study of technology adoption in a large design and construction fir...
Jonathan Grudin
IMC
2004
ACM
15 years 9 months ago
Ten fallacies and pitfalls on end-to-end available bandwidth estimation
The area of available bandwidth (avail-bw) estimation has attracted significant interest recently, with several estimation techniques and tools developed during the last 2-3 year...
Manish Jain, Constantinos Dovrolis
« Prev « First page 1712 / 1944 Last » Next »