Sciweavers

4051 search results - page 547 / 811
» Aggregation
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
AINA
2005
IEEE
15 years 10 months ago
Optimal Energy-Efficient Routing for Wireless Sensor Networks
The network lifetime for wireless sensor network plays an important role to survivability. Thus, we indicate the importance of routing protocol to network lifetime, and model the ...
Chih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Che...
ANSS
2005
IEEE
15 years 10 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
127
Voted
CCGRID
2005
IEEE
15 years 10 months ago
Fast pattern-based throughput prediction for TCP bulk transfers
The ability to quickly predict the throughput of a TCP transfer between a client and a server, or between peers, has wide application in scientific computing and commercial compu...
Tsung-i Huang, Jaspal Subhlok
146
Voted
CCGRID
2005
IEEE
15 years 10 months ago
Semantic integration of file-based data for grid services
Data services for the Grid have focussed so far primarily on virtualising access to distributed databases, and encapsulating file location. However, orchestration of services requ...
Andrew Woolf, Ray Cramer, Marta Gutierrez, Kerstin...