Publications

Export 5 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Linux  [Clear All Filters]
2009
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.
2007
Ramsbrock D, Berthier R, Cukier M.  2007.  Profiling Attacker Behavior Following SSH Compromises. :119-124.
2004
Ryu KD, Hollingsworth J.  2004.  Unobtrusiveness and efficiency in idle cycle stealing for PC grids. Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International.
2000
Spring N, Chesire M, Berryman M, Sahasranaman V, Anderson T, Bershad B.  2000.  Receiver based management of low bandwidth access links. IEEE INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:245-254vol.1-245-254vol.1.
1998
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.