Sciweavers

691 search results - page 128 / 139
» Control Choices and Network Effects in Hypertext Systems
Sort
View
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
15 years 6 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
SASO
2008
IEEE
15 years 6 months ago
Semantic Web Based Self-Management for a Pervasive Service Middleware
Self-management is one of the challenges for realizing Ambient Intelligence in pervasive computing. In this paper, we propose and present a semantic web based selfmanagement appro...
Weishan Zhang, Klaus Marius Hansen
ICPPW
2003
IEEE
15 years 5 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
WSC
1997
15 years 1 months ago
A Performance Monitoring Application for Distributed Interactive Simulations (DIS)
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...
David B. Cavitt, C. Michael Overstreet, Kurt Maly
CORR
2010
Springer
224views Education» more  CORR 2010»
14 years 11 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam