Sciweavers

21324 search results - page 3989 / 4265
» Making the case for computing
Sort
View
138
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
152
Voted
ISCA
2008
IEEE
142views Hardware» more  ISCA 2008»
15 years 10 months ago
Improving NAND Flash Based Disk Caches
Flash is a widely used storage device that provides high density and low power, appealing properties for general purpose computing. Today, its usual application is in portable spe...
Taeho Kgil, David Roberts, Trevor N. Mudge
140
Voted
P2P
2008
IEEE
102views Communications» more  P2P 2008»
15 years 10 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
133
Voted
RTCSA
2008
IEEE
15 years 10 months ago
Real-Time Scheduling Using Credit-Controlled Static-Priority Arbitration
—The convergence of application domains in new systems-on-chip (SoC) results in systems with many applications with a mix of soft and hard real-time requirements. To reduce cost,...
Benny Akesson, Liesbeth Steffens, Eelke Strooisma,...
132
Voted
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 10 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
« Prev « First page 3989 / 4265 Last » Next »