Sciweavers

4049 search results - page 602 / 810
» Neural Network Trainer through Computer Networks
Sort
View
119
Voted
NSDI
2004
15 years 4 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy
142
Voted
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
15 years 9 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
180
Voted
MONET
2011
14 years 6 months ago
Distributed Coalition Formation Games for Secure Wireless Transmission
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
129
Voted
PERCOM
2009
ACM
16 years 4 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
HPCA
2008
IEEE
16 years 3 months ago
Fabric convergence implications on systems architecture
Converged fabrics that support data, storage, and cluster networking in a unified fashion are desirable for their cost and manageability advantages. Recent trends towards higher-b...
Kevin Leigh, Parthasarathy Ranganathan, Jaspal Sub...