EECS

Results: 4734



#Item
21Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
22Computing / Internet privacy / Information and communications technology / Hypertext Transfer Protocol / Cache / Computer network security / Middlebox / Hola / Proxy server / X-Forwarded-For / Web cache / HTTP cookie

Exploring HTTP Header Manipulation In-The-Wild Gareth Tyson Shan Huang Felix Cuadrado

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2017-02-16 04:03:04
23Concurrent computing / System software / Parallel computing / Computing / Job scheduling / Scheduling / Cloud infrastructure / Apache Hadoop / Apache Software Foundation / Data-intensive computing / MapReduce / Task

The Case for Tiny Tasks in Compute Clusters Kay Ousterhout∗ , Aurojit Panda∗ , Joshua Rosen∗ , Shivaram Venkataraman∗ , Reynold Xin∗ , Sylvia Ratnasamy∗ , Scott Shenker∗† , Ion Stoica∗ ∗ UC Berkeley,

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2013-04-11 15:04:47
24Computing / Network architecture / Information and communications technology / Internet architecture / Computer networking / Internet Standards / Anycast / Multihoming / Evolvability / Routing / Scott Shenker / IPv6

Intelligent Design Enables Architectural Evolution Ali Ghodsi Teemu Koponen Barath Raghavan

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2011-10-17 01:19:02
25Cryptocurrencies / Alternative currencies / Economy / Exonumia / Numismatics / Bitcoin / Digital currencies / Blockchains / Zerocoin protocol / Cryptocurrency tumbler / CoinJoin / CryptoNote

review articles When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all. BY DANIEL GENKIN, DIMITRIOS PAPADOPOULOS, AND CHARALAMPOS PAPAMANTHOU

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-08-09 15:57:46
26Computing / Software engineering / Computer security / Hacking / Cross-site scripting / Cross-site request forgery / Security / JavaScript / SQL injection / HTTP cookie / Code injection / World Wide Web

EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
27Computing / Software bugs / Software engineering / Data types / Computer memory / Primitive types / C standard library / Memory safety / Stack buffer overflow / Pointer / Dangling pointer / Buffer overflow

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2013-03-11 01:57:58
28System software / Software / Utility software / Computer forensics / Password / Security / Disk image / VirtualBox / Autopsy / File system / Forensic science

EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
29Computing / Software engineering / Computer programming / Compiler optimizations / Compiler construction / Programming language implementation / Superoptimization / Peephole optimization / Optimizing compiler / Compiler / Pin / Mathematical optimization

G REEN T HUMB: Superoptimizer Construction Framework Phitchaya Mangpo Phothilimthana Aditya Thakur

Add to Reading List

Source URL: pl.eecs.berkeley.edu

Language: English - Date: 2016-02-20 12:12:57
30Routing / Computing / Internet architecture / Network architecture / Information and communications technology / Routing table / IP routing / Forwarding information base / Packet forwarding / Forwarding / Computer network / Router

Brief Announcement: On the Resilience of Routing Tables Joan Feigenbaum Brighten Godfrey

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-06-08 13:59:48
UPDATE