• Login
    Search 
    •   SMARTech Home
    • College of Computing (CoC)
    • School of Computer Science (SCS)
    • Search
    •   SMARTech Home
    • College of Computing (CoC)
    • School of Computer Science (SCS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 48

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Network-Wide Prediction of BGP Routes 

    Feamster, Nick; Rexford, Jennifer (Georgia Institute of Technology, 2006)
    This paper presents provably correct algorithms for computing the outcome of the BGP route-selection process for each router in a network, without simulating the complex details of BGP message passing. The algorithms ...
    Thumbnail

    Operating System Interface Obfuscation and the Revealing of Hidden Operations 

    Srivastava, Abhinav; Lanzi, Andrea; Giffin, Jonathon (Georgia Institute of Technology, 2008)
    Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of standard system call interfaces to reason about ...
    Thumbnail

    LOCK: Locating Countermeasure-Capable Prefix Hijackers 

    Qiu, Tongqing; Ji, Lusheng; Pei, Dan; Wang, Jia; Xu, Jun; Ballani, Hitesh (Georgia Institute of Technology, 2008)
    Prefix hijacking is known as one of the security threats on today’s Internet. A number of measurement based solutions have been proposed to detect prefix hijacking events. In this paper we take these solutions one step ...
    Thumbnail

    Message Ferries as Generalized Dominating Sets in Intermittently Connected Mobile Networks 

    Ammar, Mostafa H.; Polat, Bahadir K.; Sachdeva, Pushkar; Zegura, Ellen W. (Georgia Institute of Technology, 2009)
    Message ferrying is a technique for routing data in wireless and mobile networks in which one or more mobile nodes are tasked with storing and carrying data between sources and destinations. To achieve connectivity between ...
    Thumbnail

    Visualization of Exception Handling Constructs to Support Program Understanding 

    Shah, Hina; Görg, Carsten; Harrold, Mary Jean (Georgia Institute of Technology, 2009)
    This paper presents a new visualization technique for supporting the understanding of exception-handling constructs in Java programs. To understand the requirements for such a visualization, we surveyed a group of software ...
    Thumbnail

    ALGORITHMS: Collaborative research: development of vector space based methods for protein structure prediction 

    Park, Haesun; Vazirani, Vijay V. (Georgia Institute of Technology, 2007-07-16)
    Thumbnail

    Evaluating the effectiveness of using touch sensor capacitors as an input device for a wrist watch computer 

    Wilson, Gregory (Georgia Institute of Technology, 2007-12-17)
    On the go computing is becoming more important for users who wish to access information from anywhere. Wearable computers are an optimal solution to achieving this feat because it allows for easy accessibility and quick ...
    Thumbnail

    Using First Order Inductive Learning as an Alternative to a Simulator in a Game Artificial Intelligence 

    Long, Kathryn Anna (Georgia Institute of Technology, 2009-05-04)
    Currently many game artificial intelligences attempt to determine their next moves by using a simulator to predict the effect of actions in the world. However, writing such a simulator is time-consuming, and the simulator ...
    Thumbnail

    Performance Information Sharing Middleware 

    Reiss, Charles (Georgia Institute of Technology, 2008-05-05)
    This thesis presents a design for distributed monitoring system designed to enable monitoring-informed optimizationsin distributed applications. Microbenchmarks and an evaluation in a scientific-computing scenario are ...
    Thumbnail

    Distributed Feature Extraction Using Cloud Computing Resources 

    Dalton, Steven (Georgia Institute of Technology, 2009-05-04)
    The need to expand the computational resources in a massive surveillance network is clear but traditional means of purchasing new equipment for short-term tasks every year is wasteful. In this work I will provide evidence ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 5

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CommunityDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Discover

    AuthorFeamster, Nick (12)Ammar, Mostafa H. (4)Giffin, Jonathon (4)Ramachandran, Anirudh (4)Vazirani, Vijay V. (4)Srivastava, Abhinav (3)Zegura, Ellen W. (3)Corner, Mark D. (2)Dovrolis, Constantine (2)Lanzi, Andrea (2)... View MoreSubjectRouters (5)Nodes (4)Blacklists (3)Border Gateway Protocol (BGP) (3)Hypervisor (3)Operating system kernels (3)Routing (3)Algorithms (2)BGP routing (2)Botnets (2)... View MoreDate Issued2009 (17)2008 (13)2006 (10)2007 (8)Has File(s)Yes (48)
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology