Sciweavers

450 search results - page 79 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
LISA
2007
15 years 7 hour ago
Decision Support for Virtual Machine Re-Provisioning in Production Environments
Management of virtual machines (VMs) on a large scale remains a significant challenge today. We lack general and vendor-independent quantitative criteria/metrics by which to desc...
Kyrre M. Begnum, Matthew Disney, Æleen Frisc...
APVIS
2008
14 years 11 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma
DIMVA
2007
14 years 11 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
CASCON
1996
116views Education» more  CASCON 1996»
14 years 11 months ago
Measurements of DCE RPC performance in an OS/2 environment
Developing and managing applications for environments consisting of independently con gured computing systems interoperating acrossnetwork connections is of considerable interest ...
Ying Sun, Rick Bunt, Gregory M. Oster
SIGCOMM
2010
ACM
14 years 10 months ago
Achieving O(1) IP lookup on GPU-based software routers
IP address lookup is a challenging problem due to the increasing routing table size, and higher line rate. This paper investigates a new way to build an efficient IP lookup scheme...
Jin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue