Sciweavers

481 search results - page 37 / 97
» Today future importance analysis
Sort
View
INFOCOM
2003
IEEE
15 years 3 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
14 years 10 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
90
Voted
CCR
2008
84views more  CCR 2008»
14 years 9 months ago
Modeling internet topology dynamics
Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. Whi...
Hamed Haddadi, Steve Uhlig, Andrew W. Moore, Richa...
NETWORK
2008
153views more  NETWORK 2008»
14 years 9 months ago
IEEE 802.11s: WLAN mesh standardization and high performance extensions
In recent years, remarkable market competition and economy of scale has resulted in the price erosion of wireless devices for consumer electronics. Especially for wireless data ne...
Guido R. Hiertz, Yunpeng Zang, Sebastian Max, Thom...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 4 months ago
The Commit Size Distribution of Open Source Software
With the growing economic importance of open source, we need to improve our understanding of how open source software development processes work. The analysis of code contribution...
Oliver Arafat, Dirk Riehle