Sciweavers

1583 search results - page 289 / 317
» Standardization and Competitive Advantage
Sort
View
SIGECOM
2010
ACM
156views ECommerce» more  SIGECOM 2010»
15 years 2 months ago
Robust mechanisms for risk-averse sellers
The existing literature on optimal auctions focuses on optimizing the expected revenue of the seller, and is appropriate for risk-neutral sellers. In this paper, we identify good ...
Mukund Sundararajan, Qiqi Yan
NOSSDAV
2010
Springer
15 years 2 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
PPPJ
2009
ACM
15 years 2 months ago
Virtual reuse distance analysis of SPECjvm2008 data locality
Reuse distance analysis has been proved promising in evaluating and predicting data locality for programs written in Fortran or C/C++. But its effect has not been examined for ap...
Xiaoming Gu, Xiao-Feng Li, Buqi Cheng, Eric Huang
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 2 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...