Shin

Results: 1878



#Item
271

Conficker and Beyond: A Large-Scale Empirical Study Seungwon Shin Guofei Gu Success Lab, Texas A&M University

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2010-10-19 12:25:00
    272Computing / Computer hardware / Computer data storage / Computer storage media / Non-volatile memory / Computer storage devices / Computer architecture / RAID / IOPS / Solid-state drive / USB flash drive / Log-structured file system

    Gecko: A Contention-Oblivious Design for Cloud Storage Ji-Yong Shin∗, Mahesh Balakrishnan‡, Lakshmi Ganesh§, Tudor Marian†, Hakim Weatherspoon∗ ∗ Cornell University, ‡ Microsoft Research, § UT Austin, † G

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    273

    BIBDB: A Bibliographic Database for Collaboration David J. Musliner James W. Dolter Kang G. Shin

    Add to Reading List

    Source URL: musliner.com

    Language: English - Date: 2008-12-19 05:47:48
      274

      The shadow banking system: implications for financial regulation TOBIAS ADRIAN HYUN SONG SHIN

      Add to Reading List

      Source URL: www.banque-france.fr

      Language: English - Date: 2011-12-09 14:11:18
        275

        Direct approach to the inverse scattering problem for the Landau-Lifschitz equation Jaemin Shin February 1, 2010 Abstract We consider an inverse scattering problem which is associated as part of a Lax

        Add to Reading List

        Source URL: www.math.washington.edu

        - Date: 2015-01-08 11:47:20
          276

          SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype

          Add to Reading List

          Source URL: faculty.cs.tamu.edu

          Language: English - Date: 2015-07-01 22:06:30
            277

            TEACHING NOTES Prepared and Compiled by Joseph A. Maciariello with assistance from Richard Romo and Matthew Shin

            Add to Reading List

            Source URL: files.harpercollins.com

            Language: English - Date: 2015-07-13 10:38:11
              278Computing / Cyberwarfare / Computer network security / Computer networking / OpenFlow / Network architecture / Software-defined networking / Nox / Firewall / Computer network / Computer security / Denial-of-service attack

              A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

              Add to Reading List

              Source URL: www.openflowsec.org

              Language: English - Date: 2013-10-15 15:03:15
              279Chemistry / Carbohydrate chemistry / Carbohydrates / Biology / Transferases / Glycomics / Glycan / Glycoproteins / Glycosyltransferase / Nucleotide sugar / KEGG / Sialyltransferase

              Expression Analysis of Glycosyltransferase Genes in Human, Mouse, and Rat Takashi Miyama Shin Kawano

              Add to Reading List

              Source URL: www.jsbi.org

              Language: English - Date: 2005-01-18 03:30:52
              280

              CIRCA: A Cooperative Intelligent Real-Time Control Architecture David J. Musliner Edmund H. Durfee Kang G. Shin Computer Science and Engineering Division Department of Electrical Engineering and Computer Science The Univ

              Add to Reading List

              Source URL: musliner.com

              Language: English - Date: 2008-12-19 05:47:53
                UPDATE