Sciweavers

27274 search results - page 5305 / 5455
» A framework for framework documentation
Sort
View
79
Voted
CN
2006
79views more  CN 2006»
15 years 26 days ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
102
Voted
COMCOM
2006
81views more  COMCOM 2006»
15 years 26 days ago
Multiple link failures survivability of optical networks with traffic grooming capability
This paper investigates the problem of survivable traffic grooming (STG) in shared mesh optical networks and proposes different frameworks for improving the survivability of low s...
Chadi Assi, Wei Huo, Abdallah Shami
COMCOM
2006
154views more  COMCOM 2006»
15 years 26 days ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
110
Voted
CONCURRENCY
2006
142views more  CONCURRENCY 2006»
15 years 25 days ago
A Grid service broker for scheduling e-Science applications on global data Grids
: The next generation of scientific experiments and studies, popularly called e-Science, is carried out by large collaborations of researchers distributed around the world engaged ...
Srikumar Venugopal, Rajkumar Buyya, Lyle J. Winton
107
Voted
CORR
2006
Springer
145views Education» more  CORR 2006»
15 years 25 days ago
Algebraic Signal Processing Theory
In [1], we presented the algebraic signal processing theory, an axiomatic and general framework for linear signal processing. The basic concept in this theory is the signal model d...
Markus Püschel, José M. F. Moura
« Prev « First page 5305 / 5455 Last » Next »