Sciweavers

275 search results - page 52 / 55
» The Polling Primitive for Computer Networks
Sort
View
EDBTW
2010
Springer
15 years 4 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
DSN
2003
IEEE
15 years 2 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
AINA
2010
IEEE
15 years 1 months ago
Requirements for Distributed Event-Based Awareness in P2P Groupware Systems
One of the major premises of P2P systems is to enable fully decentralized collaborative functionalities for supporting work teams and P2P communities. Within collaborative systems,...
Fatos Xhafa, Alex Poulovassilis
NSDI
2007
14 years 11 months ago
Ricochet: Lateral Error Correction for Time-Critical Multicast
Ricochet is a low-latency reliable multicast protocol designed for time-critical clustered applications. It uses IP Multicast to transmit data and recovers from packet loss in end...
Mahesh Balakrishnan, Kenneth P. Birman, Amar Phani...
CLOUD
2010
ACM
15 years 2 months ago
Stateful bulk processing for incremental analytics
This work addresses the need for stateful dataflow programs that can rapidly sift through huge, evolving data sets. These data-intensive applications perform complex multi-step c...
Dionysios Logothetis, Christopher Olston, Benjamin...