Sciweavers

8080 search results - page 1492 / 1616
» From Computer Networks to Agent Networks
Sort
View
142
Voted
POLICY
2007
Springer
15 years 10 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...
134
Voted
POLICY
2007
Springer
15 years 10 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
153
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
149
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
Optimizing IP Multicast through Delayed Multicast Tree Pruning
This paper studies the system parameters that affect the total cost of managing the multicast group on a router. A Petri net model is first proposed to describe the states and tra...
Yongjun Li, Wenhui Zhou, James Zijun Wang, Deyu Qi
131
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany
« Prev « First page 1492 / 1616 Last » Next »