Sciweavers

2503 search results - page 332 / 501
» Building Computer Network Attacks
Sort
View
ICNS
2007
IEEE
15 years 8 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
MOBIDE
2005
ACM
15 years 7 months ago
Tolerance of localization imprecision in efficiently managing mobile sensor databases
Query processing on mobile sensor networks requires efficient indexing and partitioning of the data space to support efficient routing as the network scales up. Building an index ...
Lin Xiao, Aris M. Ouksel
EURONGI
2008
Springer
15 years 3 months ago
A Seamless Vertical Handover Approach
Abstract-- Wireless network devices are equipped with multiple access technologies like UMTS and Wireless LAN. The handover between the technologies has been widely studied in lite...
Rastin Pries, Dirk Staehle, Phuoc Tran-Gia, Thorst...
CLOUDCOM
2009
Springer
15 years 5 months ago
Decentralized Service Allocation in a Broker Overlay Based Grid
Abstract. Grid computing is based on coordinated resource sharing in a dynamic environment of multi-institutional virtual organizations. Data exchanges, and service allocation, are...
Abdulrahman Azab, Hein Meling
102
Voted
NCA
2008
IEEE
15 years 8 months ago
Quicksilver Scalable Multicast (QSM)
QSM is a multicast engine designed to support a style of distributed programming in which application objects are replicated among clients and updated via multicast. The model req...
Krzysztof Ostrowski, Ken Birman, Danny Dolev