Sciweavers

6808 search results - page 1134 / 1362
» Distributed Concurrency Control
Sort
View
150
Voted
NETCOOP
2009
Springer
15 years 10 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
138
Voted
IMC
2009
ACM
15 years 10 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
128
Voted
KCAP
2009
ACM
15 years 10 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...
101
Voted
CCGRID
2008
IEEE
15 years 10 months ago
Pastel: Bridging the Gap between Structured and Large-State Overlays
Peer-to-peer overlays envision a single overlay substrate that can be used (possibly simultaneously) by many applications, but current overlays either target fast, few-hop lookups...
Nuno Cruces, Rodrigo Rodrigues, Paulo Ferreira
136
Voted
CEC
2008
IEEE
15 years 10 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
« Prev « First page 1134 / 1362 Last » Next »