Sciweavers

3471 search results - page 589 / 695
» User activity histories
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
AINA
2006
IEEE
15 years 3 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
GLOBECOM
2006
IEEE
15 years 3 months ago
Two Novel Iterative Joint Frequency-Offset and Channel Estimation Methods for OFDMA Uplink
—We address joint estimation of frequency offsets and channel responses in OFDMA uplink. A cyclically equal-spaced, equal-energy interleaved pilot preamble is proposed by which t...
Xiaoyu Fu, Hlaing Minn, Cyrus D. Cantrell
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 3 months ago
Profiles as Conversation: Networked Identity Performance on Friendster
Profiles have become a common mechanism for presenting one’s identity online. With the popularity of online social networking services such as Friendster.com, Profiles have been...
Danah Boyd, Jeffrey Heer
ISPASS
2006
IEEE
15 years 3 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir