Sciweavers

119 search results - page 14 / 24
» A Flexible Resource Location Protocol for Peer-to-Peer Netwo...
Sort
View
JDCTA
2010
139views more  JDCTA 2010»
14 years 8 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
CORR
2011
Springer
164views Education» more  CORR 2011»
14 years 4 months ago
Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks
Network virtualization allows one to build dynamic distributed systems in which resources can be dynamically allocated at locations where they are most useful. In order to fully e...
Dushyant Arora, Marcin Bienkowski, Anja Feldmann, ...
CCGRID
2005
IEEE
15 years 6 months ago
Evaluating high-throughput reliable multicast for grid applications in production networks
Grid computing can be characterized as a distributed infrastructure that is a collection of computing resources within or across locations that are aggregated to act as a unified ...
Marinho P. Barcellos, Maziar Nekovee, M. Koyabe, M...
OTM
2009
Springer
15 years 7 months ago
Evaluating Transport Protocols for Real-Time Event Stream Processing Middleware and Applications
Real-time event stream processing (RT-ESP) applications must synchronize continuous data streams despite fluctuations in resource availability. Satisfying these needs of RT-ESP ap...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...
MMB
2004
Springer
176views Communications» more  MMB 2004»
15 years 6 months ago
MPLS/RSVP-TE-Based Future UMTS Radio Access Network
Currently we see a discussion on the transition from ATM-based transport to IP transport in the UMTS Terrestrial Radio Access Network (UTRAN). Issues that result from the transiti...
René Böringer, Markus Bauer, Andreas M...