Sciweavers

3192 search results - page 509 / 639
» The minimum latency problem
Sort
View
86
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
76
Voted
BROADNETS
2007
IEEE
15 years 7 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
125
Voted
ICNP
2007
IEEE
15 years 7 months ago
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs
—We present a game-theoretic study on the power and rate control problem in IEEE 802.11 WLANs where network participants choose appropriate transmission power and data rate to ac...
Lin Chen, Jean Leneutre
106
Voted
IJCNN
2007
IEEE
15 years 7 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...
95
Voted
IPPS
2007
IEEE
15 years 7 months ago
SWARM: A Parallel Programming Framework for Multicore Processors
Due to fundamental physical limitations and power constraints, we are witnessing a radical change in commodity microprocessor architectures to multicore designs. Continued perform...
David A. Bader, Varun Kanade, Kamesh Madduri