Sciweavers

98 search results - page 3 / 20
» Ideal Network Enabled Server Environment
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 6 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
ACSAC
2006
IEEE
14 years 6 days ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
ACSAC
2009
IEEE
14 years 29 days ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
VTC
2007
IEEE
132views Communications» more  VTC 2007»
14 years 12 days ago
Fault-Tolerant and Load Balancing Localization of Services in Wireless Sensor Networks
— Heterogeneous wireless sensor networks are made up of different kinds of nodes. Some nodes, the sensors, are used as an interface to the physical environment. Other nodes act i...
Francesco Nidito, Michele Battelli, Stefano Basagn...
ICDCS
2005
IEEE
13 years 11 months ago
Network-Centric Buffer Cache Organization
A pass-through server such as an NFS server backed by an iSCSI[1] storage server only passes data between the storage server and NFS clients. Ideally it should require at most one...
Gang Peng, Srikant Sharma, Tzi-cker Chiueh