Sciweavers

2904 search results - page 184 / 581
» Internet Infrastructure Security
Sort
View
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
15 years 9 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
HT
2003
ACM
15 years 9 months ago
The ambient wood journals: replaying the experience
The Ambient Wood project aims to facilitate a learning experience using an adaptive infrastructure in an outdoor environment. This involves sensor technology, virtual world orches...
Mark J. Weal, Danius T. Michaelides, Mark K. Thomp...
112
Voted
CONEXT
2007
ACM
15 years 7 months ago
A gateway for wireless broadcasting
Ad-hoc wireless peer-to-peer methods are an important and viable alternative to the more traditional infrastructure based ones for distributing contents among a population of user...
Kristján Valur Jónsson, Ólafu...
AISC
2008
Springer
15 years 5 months ago
Symbolic Computation Software Composability
We present three examples of the composition of Computer Algebra Systems to illustrate the progress on a composability infrastructure as part of the SCIEnce (Symbolic Computation I...
Sebastian Freundt, Peter Horn, Alexander Konovalov...
CCS
2009
ACM
15 years 10 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...