Sciweavers

16128 search results - page 3133 / 3226
» Distributed network scheduling
Sort
View
ACSAC
2006
IEEE
15 years 4 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
AINA
2006
IEEE
15 years 3 months ago
V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm Benchmark
Most conventional IPv4-based route lookup algorithms are no more suitable for IPv6 packet forwarding due to the significantly increased 128-bit-long address. However, as a result o...
Kai Zheng, Bin Liu
ANSS
2006
IEEE
15 years 3 months ago
Performance Study of End-to-End Traffic-Aware Routing
There has been a lot research effort on developing reactive routing algorithms for mobile ad hoc networks (MANETs) over the past few years. Most of these algorithms consider findi...
Raad S. Al-Qassas, Lewis M. Mackenzie, Mohamed Oul...
CCECE
2006
IEEE
15 years 3 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
ICPADS
2006
IEEE
15 years 3 months ago
On-Demand High Performance Computing: Image Guided Neuro-Surgery Feasibility Study
The emerging cyberinfrastructure holds the promise to provide on-demand access to high performance network resources, computing resources, and data storage/retrieval resources fro...
Tharaka Devadithya, Kim Baldridge, Adam Birnbaum, ...
« Prev « First page 3133 / 3226 Last » Next »