Sciweavers

524 search results - page 68 / 105
» Why phishing works
Sort
View
CISIS
2010
IEEE
15 years 5 months ago
Study of Variations of Native Program Execution Times on Multi-Core Architectures
Abstract—Program performance optimisations, feedbackdirected iterative compilation and auto-tuning systems [1] all assume a fixed estimation of execution time given a fixed inp...
Abdelhafid Mazouz, Sid Ahmed Ali Touati, Denis Bar...
INFOCOM
2003
IEEE
15 years 5 months ago
On the Intrinsic Locality Properties of Web Reference Streams
— There has been considerable work done in the study of Web reference streams: sequences of requests for Web objects. In particular, many studies have looked at the locality prop...
Rodrigo C. Fonseca, Virgilio Almeida, Mark Crovell...
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 5 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
SIGUCCS
2003
ACM
15 years 5 months ago
Supporting a Windows XP/Red Hat Linux dual boot environment
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Bert Valenzuela
DSN
2002
IEEE
15 years 4 months ago
A Realistic Look At Failure Detectors
This paper shows that, in an environment where we do not bound the number of faulty processes, the class P of Perfect failure detectors is the weakest (among realistic failure det...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...