In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Our aim is to investigate reliable transmission for multicast communication and explore its relationship to multicast routing. We derive two characterizations that enable the comp...
In this paper, we present a new methodology for evaluating fault recovery performance of some existing mechanisms, which considers the establishment of quality of service network ...
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shi...
Although grid computing has adopted Web services technology to deal with platforms heterogeneity and to enhance service and application interoperability, it is still a challenge t...
Xiaohui Wei, Jishan Gao, Xiao lei Ding, Shutao Yua...