Sciweavers

9842 search results - page 1946 / 1969
» Net-Centric Information Management
Sort
View
71
Voted
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
15 years 3 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
ASPLOS
2006
ACM
15 years 3 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
DIM
2006
ACM
15 years 3 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...
IMC
2006
ACM
15 years 3 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
61
Voted
ITICSE
2006
ACM
15 years 3 months ago
ASSISTing CS1 students to learn: learning approaches and object-oriented programming
Identifying and managing students who experience difficulty with learning to program is a challenge for CS educators. In an attempt to answer the familiar question “What makes f...
Janet Hughes, D. Ramanee Peiris
« Prev « First page 1946 / 1969 Last » Next »