Sciweavers

5665 search results - page 960 / 1133
» Introduction to Computer Security
Sort
View
MINENET
2005
ACM
15 years 8 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
PASTE
2005
ACM
15 years 8 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
111
Voted
SAC
2005
ACM
15 years 8 months ago
Supporting e-commerce systems formalization with choreography languages
E-commerce as well as B2B applications are essentially based on interactions between different people and organizations (e.g. industry, banks, customers) that usually exploit the ...
Mario Bravetti, Claudio Guidi, Roberto Lucchi, Gia...
102
Voted
SC
2005
ACM
15 years 8 months ago
The Globus Striped GridFTP Framework and Server
The GridFTP extensions to the File Transfer Protocol define a general-purpose mechanism for secure, reliable, high-performance data movement. We report here on the Globus striped ...
William E. Allcock, John Bresnahan, Rajkumar Ketti...
SC
2005
ACM
15 years 8 months ago
An Adaptive Visual Analytics Platform for Mobile Devices
We present the design and implementation of InfoStar, an adaptive visual analytics platform for mobile devices such as PDAs, laptops, Tablet PCs and mobile phones. InfoStar extends...
Antonio Sanfilippo, Richard May, Gary Danielson, B...