Sciweavers

1707 search results - page 330 / 342
» Clustering Protocol for Sensor Networks
Sort
View
91
Voted
ICNS
2007
IEEE
15 years 4 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
HOTOS
1993
IEEE
15 years 1 months ago
xFS: A Wide Area Mass Storage File System
The current generation of le systems are inadequate in facing the new technological challenges of wide area networks and massive storage. xFS is a prototype le system we are devel...
Randolph Y. Wang, Thomas E. Anderson
FPL
2006
Springer
242views Hardware» more  FPL 2006»
15 years 1 months ago
TMD-MPI: An MPI Implementation for Multiple Processors Across Multiple FPGAs
With current FPGAs, designers can now instantiate several embedded processors, memory units, and a wide variety of IP blocks to build a single-chip, high-performance multiprocesso...
Manuel Saldaña, Paul Chow
COMCOM
2004
85views more  COMCOM 2004»
14 years 9 months ago
Optimal PNNI complex node representations for restrictive costs
The Private Network-to-Network Interface (PNNI) is a scalable hierarchical protocol that allows ATM switches to be aggregated into clusters called peer groups. To provide good acc...
Ilias Iliadis
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
15 years 9 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...