Sciweavers

14824 search results - page 2601 / 2965
» Security - Introduction
Sort
View
SIGECOM
2004
ACM
77views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Stopping outgoing spam
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...
Joshua T. Goodman, Robert Rounthwaite
111
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
131
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
Open problems in data collection networks
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of ...
Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Me...
159
Voted
SWS
2004
ACM
15 years 9 months ago
Creating non-decomposable stream bundles in multimedia web services using uSMIL
Technical advances in networks, operating systems and web based services are enabling new web-based services such as audiovisual surveillance, monitoring and recording of unfoldin...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
99
Voted
WOSP
2004
ACM
15 years 9 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
« Prev « First page 2601 / 2965 Last » Next »