Sciweavers

2522 search results - page 316 / 505
» Tools for Heterogeneous Network Computing
Sort
View
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
145
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
PERCOM
2006
ACM
16 years 3 months ago
Managing Pervasive Systems using Role-based Obligation Policies
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
Chetan Shiva Shankar, Roy H. Campbell
129
Voted
PERCOM
2003
ACM
16 years 3 months ago
Portability, Extensibility and Robustness in iROS
The dynamism and heterogeneity in ubicomp environments on both short and long time scales implies that middleware platforms for these environments need to be designed ground up fo...
Shankar Ponnekanti, Brad Johanson, Emre Kiciman, A...
108
Voted
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 10 months ago
An Approximation Algorithm for Minimum-Delay Peer-to-Peer Streaming
Peer-to-peer (P2P) technology provides a scalable solution in multimedia streaming. Many streaming applications, such as IPTV and video conferencing, have rigorous constraints on ...
Fei Huang, Binoy Ravindran, Anil Vullikanti