Sciweavers

8810 search results - page 1682 / 1762
» Openness
Sort
View
149
Voted
CN
2007
137views more  CN 2007»
15 years 3 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
IOR
2008
113views more  IOR 2008»
15 years 3 months ago
Service Competition with General Queueing Facilities
In many service industries, companies compete with each other on the basis of the waiting time their customers experience, along with the price they charge for their service. A fi...
Gad Allon, Awi Federgruen
136
Voted
IJAC
2006
93views more  IJAC 2006»
15 years 3 months ago
On Word Reversing in Braid Groups
It has been conjectured that in a braid group, or more generally in a Garside group, applying any sequence of monotone equivalences and word reversings can increase the length of a...
Patrick Dehornoy, Bert Wiest
137
Voted
COMPLEXITY
2007
116views more  COMPLEXITY 2007»
15 years 3 months ago
Life, information, entropy, and time: Vehicles for semantic inheritance
abstractions provides an additional supra-phenotypic vehicle for semantic inheritance, which supports the cultural heritages around which civilizations revolve. The following three...
Antony R. Crofts
140
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 3 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
« Prev « First page 1682 / 1762 Last » Next »