Sciweavers

20813 search results - page 348 / 4163
» Introduction to Computer Networking
Sort
View
102
Voted
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 10 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
153
Voted
ACSAC
2000
IEEE
15 years 8 months ago
On Computer Viral Infection and the Effect of Immunization
Viruses remain a significant threat to modern networked computer systems. Despite the best efforts of those who develop anti-virus systems, new viruses and new types of virus that...
Chenxi Wang, John C. Knight, Matthew C. Elder
157
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Cross-Layer Rate Allocation for Multimedia Applications in Pervasive Computing Environment
Abstract— An important issue for supporting multimedia applications in multiple heterogeneous networks, a typical pervasive computing environment, is how to optimize the rate all...
Liang Zhou, Benoit Geller, Anne Wei, Baoyu Zheng, ...
144
Voted
SSDBM
2010
IEEE
142views Database» more  SSDBM 2010»
15 years 1 months ago
Efficient and Adaptive Distributed Skyline Computation
Skyline queries have attracted considerable attention over the last few years, mainly due to their ability to return interesting objects without the need for user-defined scoring f...
George Valkanas, Apostolos N. Papadopoulos
142
Voted
STOC
1994
ACM
134views Algorithms» more  STOC 1994»
15 years 7 months ago
A coding theorem for distributed computation
Shannon's Coding Theorem shows that in order to reliably transmit a message of T bits over a noisy communication channel, only a constant slowdown factor is necessary in the ...
Sridhar Rajagopalan, Leonard J. Schulman