Sciweavers

823 search results - page 95 / 165
» Location Based Access to Moving Data Sources
Sort
View
NSDI
2010
15 years 3 months ago
Volley: Automated Data Placement for Geo-Distributed Cloud Services
: As cloud services grow to span more and more globally distributed datacenters, there is an increasingly urgent need for automated mechanisms to place application data across thes...
Sharad Agarwal, John Dunagan, Navendu Jain, Stefan...
122
Voted
INFOCOM
2002
IEEE
15 years 6 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 5 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
NAR
2008
114views more  NAR 2008»
15 years 1 months ago
ENDEAVOUR update: a web resource for gene prioritization in multiple species
ENDEAVOUR (http://www.esat.kuleuven.be/endeavour web; this web site is free and open to all users and there is no login requirement) is a web resource for the prioritization of ca...
Léon-Charles Tranchevent, Roland Barriot, S...
ECCV
2010
Springer
15 years 6 months ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more di...