Sciweavers

16128 search results - page 3133 / 3226
» Distributed network scheduling
Sort
View
119
Voted
ACSAC
2006
IEEE
15 years 8 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
131
Voted
AINA
2006
IEEE
15 years 8 months ago
V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm Benchmark
Most conventional IPv4-based route lookup algorithms are no more suitable for IPv6 packet forwarding due to the significantly increased 128-bit-long address. However, as a result o...
Kai Zheng, Bin Liu
131
Voted
ANSS
2006
IEEE
15 years 8 months ago
Performance Study of End-to-End Traffic-Aware Routing
There has been a lot research effort on developing reactive routing algorithms for mobile ad hoc networks (MANETs) over the past few years. Most of these algorithms consider findi...
Raad S. Al-Qassas, Lewis M. Mackenzie, Mohamed Oul...
135
Voted
CCECE
2006
IEEE
15 years 8 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
143
Voted
ICPADS
2006
IEEE
15 years 8 months ago
On-Demand High Performance Computing: Image Guided Neuro-Surgery Feasibility Study
The emerging cyberinfrastructure holds the promise to provide on-demand access to high performance network resources, computing resources, and data storage/retrieval resources fro...
Tharaka Devadithya, Kim Baldridge, Adam Birnbaum, ...
« Prev « First page 3133 / 3226 Last » Next »