Sciweavers

849 search results - page 120 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
119
Voted
USS
2010
14 years 10 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
IPPS
2009
IEEE
15 years 7 months ago
Design, implementation, and evaluation of transparent pNFS on Lustre
Parallel NFS (pNFS) is an emergent open standard for parallelizing data transfer over a variety of I/O protocols. Prototypes of pNFS are actively being developed by industry and a...
Weikuan Yu, Oleg Drokin, Jeffrey S. Vetter
QOFIS
2004
Springer
15 years 5 months ago
Cross-Layer Analytical Modeling of Wireless Channels for Accurate Performance Evaluation
Abstract. An intention to adopt IP protocol for future mobile communication and subsequent extension of Internet services to the air interface calls for advanced performance modeli...
Dmitri Moltchanov, Yevgeni Koucheryavy, Jarmo Harj...
128
Voted
MAM
2002
151views more  MAM 2002»
15 years 4 days ago
A performance evaluation of cache injection in bus-based shared memory multiprocessors
Bus-based shared memory multiprocessors with private caches and snooping write-invalidate cache coherence protocols are dominant form of small- to medium-scale parallel machines t...
Aleksandar Milenkovic, Veljko M. Milutinovic
112
Voted
IFIP
2010
Springer
14 years 10 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor