Sciweavers

11752 search results - page 2284 / 2351
» Those
Sort
View
RAID
2010
Springer
14 years 8 months ago
Fast-Flux Bot Detection in Real Time
The fast-flux service network architecture has been widely adopted by bot herders to increase the productivity and extend the lifespan of botnets’ domain names. A fast-flux bot...
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
REPLICATION
2010
14 years 8 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman
RV
2010
Springer
127views Hardware» more  RV 2010»
14 years 8 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
SCN
2010
Springer
176views Communications» more  SCN 2010»
14 years 8 months ago
The Fiat-Shamir Transform for Group and Ring Signature Schemes
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signat...
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi
SIAMAM
2010
119views more  SIAMAM 2010»
14 years 8 months ago
The Dynamics of Weakly Reversible Population Processes near Facets
This paper concerns the dynamical behavior of weakly reversible, deterministically modeled population processes near the facets (codimension-one faces) of their invariant manifolds...
David F. Anderson, Anne Shiu
« Prev « First page 2284 / 2351 Last » Next »