Sciweavers

450 search results - page 73 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
CCS
2007
ACM
15 years 3 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
GRID
2004
Springer
15 years 3 months ago
Memory Conscious Task Partition and Scheduling in Grid Environments
While resource management and task scheduling are identified challenges of Grid computing, current Grid scheduling systems mainly focus on CPU and network availability. Recent per...
Ming Wu, Xian-He Sun
CHI
2010
ACM
15 years 3 months ago
Managing nomadic knowledge: a case study of the European social forum
In this paper we portray a specific type of knowledge which we term ‘nomadic knowledge’. It is required periodically by different actors and travels along foreseeable paths be...
Saqib Saeed, Volkmar Pipek, Markus Rohde, Volker W...
ICNP
2003
IEEE
15 years 3 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ICWSM
2008
14 years 11 months ago
Competing to Share Expertise: The Taskcn Knowledge Sharing Community
"Witkeys" are websites in China that form a rapidly growing web-based knowledge market. A user who posts a task also offers a small fee, and many other users submit thei...
Jiang Yang, Lada A. Adamic, Mark S. Ackerman