Sciweavers

505 search results - page 88 / 101
» Message from General Co-Chairs
Sort
View
102
Voted
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 8 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
SPAA
2005
ACM
15 years 7 months ago
Constant density spanners for wireless ad-hoc networks
An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining...
Kishore Kothapalli, Christian Scheideler, Melih On...
IUI
2004
ACM
15 years 7 months ago
An intelligent assistant for interactive workflow composition
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Jihie Kim, Marc Spraragen, Yolanda Gil
158
Voted
SIGCOMM
2003
ACM
15 years 7 months ago
A comparison of hard-state and soft-state signaling protocols
One of the key infrastructure components in all telecommunication networks, ranging from the telephone network, to VC-oriented data networks, to the Internet, is its signaling sys...
Ping Ji, Zihui Ge, James F. Kurose, Donald F. Tows...
FOCS
2002
IEEE
15 years 6 months ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer