Results 1 -
5 of
5
Screen Savers of the World Unite!
, 2000
"... this article Download to Citation Manager Collections under which this unparallelizable to be performed on hundreds or thousands of computers with very little communication between the processors. Even if an algorithm can be parallelized, it may still be poorly suited for distributed computing. Cons ..."
Abstract
-
Cited by 34 (3 self)
- Add to MetaCart
. Consider, for example, simulations of the dynamics of biomolecules at the atomic level. Such simulations are traditionally limited to the nanosecond time scale. Duan and Kollman have demonstrated that traditional parallel molecular dynamics simulations can break the microsecond barrier (3), provided
BCQ A BIN-BASED CORE STATELESS PACKET SCHEDULER FOR SCALABLE AND FLEXIBLE SUPPORT OF GUARANTEED SERVICES By
"... The Office of Graduate Studies has verified and approved the above named committee members. ii To Mom, Dad & kaushik... iii ACKNOWLEDGMENTS I would like to express my sincere gratitude to all who have given me the guidance, direction and support to conduct research & complete my thesis. I am ..."
Abstract
- Add to MetaCart
am deeply indebted to my advisor Prof. Zhenhai Duan, without whose patience, constant guidance, support & direction, I would not have learnt as much and benefited. I would also like to thank Dr.Xin Yuan & Dr.Kartik Gopalan for serving on the thesis committee and for their valuable inputs. I
Summer, 1992)
, 1992
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract
- Add to MetaCart
of design for questionnaires to be administered by interviewers has not been ac-MARIA ELENA SANCHEZ iS a survey methodologist at the Agency for Health Care Policy and Research. I wish to thank the following: Duane F. Alwin, who generously granted permission to use the data; Merilynn R. Dielman, especially
ative Commons Attribution Non-Commercial No Derivatives licence. Researchers
"... I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged. ..."
Abstract
- Add to MetaCart
I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged.
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-world network traffic is largely legitimate and that telltales manifested by exploits rarely appear in network streams lead us to the proposal of Fingerprinter. This framework integrates fingerprinting and PM methods to rapidly distinguish well-behaved from malicious traffic. Fingerprinter produces concise digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream cannot be determined by fingerprints alone, our framework uses the Boyer–Moore algorithm to ascertain whether attack signatures appear in the stream. To reduce false matches, we resort to multiple fingerprinting techniques including Bloom–Filter and Rabin–Fingerprint. Experimentation with a prototype and a variety of traces has helped us establish that Fingerprinter significantly accelerates the attack detection process.