Sciweavers

613 search results - page 60 / 123
» DiffServ over Network Processors: Implementation and Evaluat...
Sort
View
TDSC
2010
101views more  TDSC 2010»
14 years 8 months ago
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
—This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines ...
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan ...
LCN
2000
IEEE
15 years 2 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
15 years 3 months ago
Heuristic speciation for evolving neural network ensemble
Speciation is an important concept in evolutionary computation. It refers to an enhancements of evolutionary algorithms to generate a set of diverse solutions. The concept is stud...
Shin Ando
MMS
2006
14 years 9 months ago
A platform for virtual collaboration spaces and educational communities: the case of EVE
This paper presents the design, implementation and evaluation of EVE Community Prototype, which is an educational virtual community aiming to meet the requirements of a Virtual Col...
Christos Bouras, Eri Giannaka, Alexandros Panagopo...
DSN
2005
IEEE
15 years 3 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...