Search

Your search keyword '"Geoffrey M. Voelker"' showing total 246 results

Search Constraints

Start Over You searched for: Author "Geoffrey M. Voelker" Remove constraint Author: "Geoffrey M. Voelker"
246 results on '"Geoffrey M. Voelker"'

Search Results

151. Enfold

152. Tripwire

154. Scheduling techniques for hybrid circuit/packet networks

155. DieCast

156. Privacy-preserving network forensics

157. Sora

158. Difference engine

159. Usage Patterns in an Urban WiFi Network

160. Neon

161. Cumulus

162. Spamalytics

163. Automatic request categorization in internet services

164. Who is .com?

165. Affiliate Crookies

166. CQIC

167. [Untitled]

168. End-to-end differentiation of congestion and wireless losses

169. Characterizing user behavior and network performance in a public wireless LAN

170. Search + Seizure

171. Knock it off

172. XXXtortion?

173. The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules

174. Bullet trains

175. Detour: informed Internet routing and transport

176. Implementing cooperative prefetching and caching in a globally-managed memory system

177. Managing server load in global memory systems

178. A fistful of bitcoins

179. REACToR: A reconfigurable packet and circuit ToR switch

180. Reducing network latency using subpages in a global memory environment

181. Access and mobility of wireless PDA users

182. Priceless

183. Weighted fair queuing with differential dropping

184. Limitations of Scanned Human Copresence Encounters for Modelling Proximity-Borne Malware

185. An analysis of underground forums

186. Topic modeling of freelance job postings to monitor web service abuse

187. Cloak and dagger

188. Click Trajectories: End-to-End Analysis of the Spam Value Chain

189. Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd

190. Got traffic?

191. DefenestraTor: Throwing Out Windows in Tor

192. How to tell an airport from a home

193. Beyond heuristics

194. Second life

195. SAM

196. Beyond blacklists

197. Identifying suspicious URLs

198. Defending Mobile Phones from Proximity Malware

199. MPIWiz

200. Analysis of a mixed-use urban wifi network

Catalog

Books, media, physical & digital resources