Sciweavers

537 search results - page 89 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
FSTTCS
2009
Springer
15 years 5 months ago
Approximating Fault-Tolerant Group-Steiner Problems
In this paper, we initiate the study of designing approximation algorithms for FaultTolerant Group-Steiner (FTGS) problems. The motivation is to protect the well-studied group-Ste...
Rohit Khandekar, Guy Kortsarz, Zeev Nutov
ICUIMC
2009
ACM
15 years 5 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
IPPS
2007
IEEE
15 years 5 months ago
Packet Loss Burstiness: Measurements and Implications for Distributed Applications
Many modern massively distributed systems deploy thousands of nodes to cooperate on a computation task. Network congestions occur in these systems. Most applications rely on conge...
David X. Wei, Pei Cao, Steven H. Low
WETICE
2007
IEEE
15 years 5 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
ACSAC
2006
IEEE
15 years 4 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu