Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "are we more secure than yesterday" or "how does the security of one network configuration compare with another one." In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring...
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of t...
Whereas unicast routing determines a path from one source node to one destination node, multicast routing determines a path from one source to many destinations, or from many sources to many destinations. We survey multicast routing methods for when the set of destinations is static, and for when it is dynamic. While most of the methods we review are tree based, some non-tree methods are also discussed. We survey results on the shape of multicast trees, delay constrained multicast routing, aggregation of multicast traffic, inter-domain multicast, and multicast virtual private networks. We...
Whereas unicast routing determines a path from one source node to one destination node, multicast routing determines a path from one source to many de...
The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common foreground objects from multiple related images. They survey several of the algorithms, present underlying common ideas, and give an overview of applications of object co-segmentation.
The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common for...
Cloud computing is the latest market-oriented computing paradigm which brings software design and development into a new era characterized by "XaaS," i.e. everything as a service. Cloud workflows, as typical software applications in the cloud, are composed of a set of partially ordered cloud software services to achieve specific goals. However, due to the low QoS (quality of service) nature of the cloud environment, the design of workflow systems in the cloud becomes a challenging issue for the delivery of high quality cloud workflow applications. To address such an issue, this book...
Cloud computing is the latest market-oriented computing paradigm which brings software design and development into a new era characterized by "XaaS...
SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. As part of Springer's eBook collection, SpringBriefs are published to millions of users worldwide. Information/Data Leakage poses a serious threat to companies and organizations, as the number of leakage incidents and...
SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volum...
Existing software applications should be redesigned if programmers want to benefit from the performance offered by multi- and many-core architectures. Performance scalability now depends on the possibility of finding and exploiting enough Thread-Level Parallelism (TLP) in applications for using the increasing numbers of cores on a chip.
Video decoding is an example of an application domain with increasing computational requirements every new generation. This is due, on the one hand, to the trend towards high quality video systems (high definition and frame rate, 3D displays, etc)...
Existing software applications should be redesigned if programmers want to benefit from the performance offered by multi- and many-core architectur...
Applications that require a high degree of distribution and loosely-coupled connectivity are ubiquitous in various domains, including scientific databases, bioinformatics, and multimedia retrieval. In all these applications, data is typically voluminous and multidimensional, and support for advanced query operators is required for effective querying and efficient processing. To address this challenge, we adopt a hybrid P2P architecture and propose novel indexing and query processing algorithms. We present a scalable framework that relies on data summaries that are distributed and maintained...
Applications that require a high degree of distribution and loosely-coupled connectivity are ubiquitous in various domains, including scientific datab...