Sciweavers

1405 search results - page 214 / 281
» We Are No Longer A Priesthood
Sort
View
93
Voted
IMC
2009
ACM
15 years 7 months ago
Triangle inequality variations in the internet
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
114
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan
ICST
2008
IEEE
15 years 7 months ago
Model-Based Testing of Automotive Systems
In recent years the development of automotive embedded devices has changed from an electrical and mechanical engineering discipline to a combination of software and electrical/mec...
Eckard Bringmann, Andreas Krämer
124
Voted
ADHOCNOW
2008
Springer
15 years 7 months ago
Adapting BitTorrent to Wireless Ad Hoc Networks
Abstract. BitTorrent is one of the Internet’s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance...
Mohamed Karim Sbai, Chadi Barakat, Jaeyoung Choi, ...
ACSAC
2007
IEEE
15 years 7 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda