Sciweavers

10396 search results - page 1867 / 2080
» Deployment Support Network
Sort
View
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
HOTI
2008
IEEE
15 years 10 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
ICC
2008
IEEE
147views Communications» more  ICC 2008»
15 years 10 months ago
QOAR: Adaptive QoS Scheme in Multi-Rate Wireless LANs
—With the availability of multiple rates in IEEE 802.11a/b/g wireless LANs, it is desirable to improve the network capacity and temporal fairness by sending multiple consecutive ...
Ming Li, Yang Xiao, Hua Zhu, Imrich Chlamtac, Bala...
ICDCS
2008
IEEE
15 years 10 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
15 years 10 months ago
DONet-VoD: A hybrid overlay solution for efficient peer-to-peer video on demand services
The existing DONet-based approach uses successfully a random gossip algorithm for scalable live video streaming. This pure mesh overlay network-based solution may lead to unaccept...
Changqiao Xu, Gabriel-Miro Muntean, Enda Fallon, X...
« Prev « First page 1867 / 2080 Last » Next »