منابع مشابه
Stealing Reality
In this paper we discuss the threat of malware targeted at extracting information about the relationships in a real-world social network as well as characteristic information about the individuals in the network, which we dub Stealing Reality. We present Stealing Reality (SR), explain why it differs from traditional types of network attacks, and discuss why its impact is significantly more dang...
متن کاملHistones
JAUNDICE DURING PREGNANCY. By Urs Peter Haemmerli. New York, Springer-Verlag, Inc., 1967. 111 pp. $3.80, paperbound. Jaundice During Pregnancy is an excellent monograph which should be read by all internists, obstetricians, and pediatricians, and which should be available in all medical libraries for ready reference. The author concisely summarizes the known minor alterations of the liver and i...
متن کاملLatency-Hiding Work Stealing
With the rise of multicore computers, parallel applications no longer consist solely of computational, batch workloads, but also include applications that may, for example, take input from a user, access secondary storage or the network, or perform remote procedure calls. Such operations can incur substantial latency, requiring the program to wait for a response. In the current state of the art...
متن کاملHierarchical Work-Stealing
dynamic load-balancing on hierarchical platforms. In particular, we consider applications involving heavy communications on a distributed platform. The work-stealing algorithm introduced by Blumofe and Leiserson is a commonly used technique to balance load in a distributed environment but it suffers from poor performance with some communication-intensive applications. We describe here several v...
متن کاملStealing Your Money Through
Cyber criminals are using advanced attacks to exploit online banking systems and services to covertly steal money. This paper describes the tactics currently used by cyber criminals to conduct cyber bank robbery. The Art of Cyber Bank Robbery earn approximately $25,000. Recent botnets such as Zeus, SpyEye, and Citadel have infected millions of machines. If the same formula is applied, potential...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cell Biology
سال: 2006
ISSN: 1540-8140,0021-9525
DOI: 10.1083/jcb.1746iti2