Sciweavers

2407 search results - page 356 / 482
» Design considerations for network processor operating system...
Sort
View
147
Voted
ICWS
2003
IEEE
15 years 5 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti
130
Voted
IPPS
1996
IEEE
15 years 8 months ago
Experience with Parallel Computing on the AN2 Network
Technology trends make it attractive to use workstations connected by a local area network as a multicomputing platform for parallel applications. Achieving acceptable application...
Daniel J. Scales, Michael Burrows, Chandramohan A....
SRDS
2006
IEEE
15 years 9 months ago
Generalised Repair for Overlay Networks
We present and evaluate a generic approach to the repair of overlay networks which identifies general principles of overlay repair and embodies these as a reusable service. At th...
Barry Porter, François Taïani, Geoff C...
120
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Improving Web Performance in Broadcast-Unicast Networks
— Satellite operators have recently begun offering Internet access over their networks. Typically, users connect to the network using a modem for uplink, and a satellite dish for...
Mukesh Agrawal, Amit Manjhi, Nikhil Bansal, Sriniv...
199
Voted
DASC
2006
IEEE
15 years 9 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...