Sciweavers

130 search results - page 25 / 26
» Dynamic load balancing for network intrusion detection syste...
Sort
View
HOTI
2008
IEEE
13 years 12 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
ICPP
2009
IEEE
14 years 3 days ago
SkipStream: A Clustered Skip Graph Based On-demand Streaming Scheme over Ubiquitous Environments
Providing continuous on-demand streaming services with VCR functionality over ubiquitous environments is challenging due to the stringent QoS requirements of streaming service as ...
Qifeng Yu, Tianyin Xu, Baoliu Ye, Sanglu Lu, Daoxu...
DEBS
2008
ACM
13 years 7 months ago
Event-based constraints for sensornet programming
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...
Jie Mao, John Jannotti, Mert Akdere, Ugur Ç...
ICAS
2006
IEEE
207views Robotics» more  ICAS 2006»
13 years 11 months ago
Biologically-Inspired Design of Autonomous and Adaptive Grid Services
Abstract—This paper describes and evaluates a biologically-inspired network architecture that allows grid services to autonomously adapt to dynamic environment changes in the net...
Chonho Lee, Junichi Suzuki
SSDBM
2005
IEEE
132views Database» more  SSDBM 2005»
13 years 11 months ago
Co-Scheduling of Computation and Data on Computer Clusters
Scientific investigations have to deal with rapidly growing amounts of data from simulations and experiments. During data analysis, scientists typically want to extract subsets o...
Alexandru Romosan, Doron Rotem, Arie Shoshani, Der...