Sciweavers

1845 search results - page 338 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
MUE
2009
IEEE
252views Multimedia» more  MUE 2009»
15 years 8 months ago
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats...
Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan
SIGCOMM
2009
ACM
15 years 7 months ago
Hot today, gone tomorrow: on the migration of MySpace users
While some empirical studies on Online Social Networks (OSNs) have examined the growth of these systems, little is known about the patterns of decline in user population or user a...
Mojtaba Torkjazi, Reza Rejaie, Walter Willinger
MOBIQUITOUS
2008
IEEE
15 years 7 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
ICEBE
2007
IEEE
126views Business» more  ICEBE 2007»
15 years 7 months ago
Consumer-Centric Web Services Discovery and Subscription
Nowadays, there are a number of similar web services over the internet or intranet. They provide consumers with more choices according to their personalized QoS requirements. Howe...
Xuanzhe Liu, Li Zhou, Gang Huang, Hong Mei
ICNP
2007
IEEE
15 years 7 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...