Sciweavers

14824 search results - page 2782 / 2965
» Security - Introduction
Sort
View
TDP
2010
189views more  TDP 2010»
14 years 6 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
TDSC
2010
160views more  TDSC 2010»
14 years 6 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
TDSC
2010
172views more  TDSC 2010»
14 years 6 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
TDSC
2010
101views more  TDSC 2010»
14 years 6 months ago
Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense o...
Mi Kyung Han, Lili Qiu
TDSC
2010
146views more  TDSC 2010»
14 years 6 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
« Prev « First page 2782 / 2965 Last » Next »