Sciweavers

499 search results - page 80 / 100
» Compositional Systems over Reducible Networks
Sort
View
JSAC
2006
172views more  JSAC 2006»
14 years 11 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
SECURWARE
2008
IEEE
15 years 6 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
CLOUD
2010
ACM
15 years 4 months ago
RACS: a case for cloud storage diversity
The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. However, success for cloud storage pr...
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weath...
CONEXT
2009
ACM
15 years 22 days ago
SafeGuard: safe forwarding during route changes
This paper presents the design and evaluation of SafeGuard, an intra-domain routing system that can safely forward packets to their destinations even when routes are changing. Saf...
Ang Li, Xiaowei Yang, David Wetherall
INFOCOM
2006
IEEE
15 years 5 months ago
Resource Allocation for Multicast Services in Multicarrier Wireless Communications
— We consider a multicast resource allocation problem for the downlink in OFDM-based wireless cellular network systems. In a conventional multicast system, to accommodate users w...
Changho Suh, Jeonghoon Mo