Sciweavers

18924 search results - page 3486 / 3785
» Conformance of Distributed Systems
Sort
View
149
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 4 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2010
Springer
142views Education» more  CORR 2010»
15 years 4 months ago
The Accuracy of Tree-based Counting in Dynamic Networks
Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 4 months ago
Montage: a grid portal and software toolkit for science-grade astronomical image mosaicking
: Montage is a portable software toolkit for constructing custom, science-grade mosaics by composing multiple astronomical images. The mosaics constructed by Montage preserve the a...
Joseph C. Jacob, Daniel S. Katz, G. Bruce Berriman...
135
Voted
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
15 years 4 months ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...
« Prev « First page 3486 / 3785 Last » Next »