Sciweavers

8770 search results - page 1635 / 1754
» Named Service Networking
Sort
View
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 8 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
100
Voted
CISIS
2010
IEEE
15 years 6 months ago
Computational Grid as an Appropriate Infrastructure for Ultra Large Scale Software Intensive Systems
—Ultra large scale (ULS) systems are future software intensive systems that have billions of lines of code, composed of heterogeneous, changing, inconsistent and independent elem...
Babak Rezaei Rad, Fereidoon Shams Aliee
99
Voted
SAC
2010
ACM
15 years 6 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
HICSS
2009
IEEE
134views Biometrics» more  HICSS 2009»
15 years 6 months ago
Simulating Large-Scale P2P Assisted Video Streaming
In this paper, we show through detailed simulations that BitTorrent can be used to assist a server or content distribution network (CDN) for large-scale streaming delivery. Speciï...
Ryan LaFortune, Christopher D. Carothers, William ...
125
Voted
EMS
2009
IEEE
15 years 5 months ago
Simulation of a Smart Grid City with Software Agents
—In the future smart city, new information and communication technologies will enable a better management of the available resources. The future smart grid infrastructure is emer...
Stamatis Karnouskos, Thiago Nass de Holanda
« Prev « First page 1635 / 1754 Last » Next »