Sciweavers

401 search results - page 56 / 81
» Tools for Teaching Computer Networking and Hardware Concepts
Sort
View

Publication
148views
15 years 1 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
ICPADS
2007
IEEE
15 years 6 months ago
Federated clusters using the transparent remote Execution (TREx) environment
- Due to the increasing complexity of scientific models, large-scale simulation tools often require a critical amount of computational power to produce results in a reasonable amou...
Richert Wang, Enrique Cauich, Isaac D. Scherson
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
USS
2004
15 years 1 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
WEBNET
2000
15 years 1 months ago
New Approaches to Law Education: Making the Case for Web-based Learning
: Web-based instruction and online learning are changing customary practices in education. As conventional patterns for content delivery are influenced by new and improving technol...
Jennifer Gramling, Tom Galligan, Jean A. Derco