Sciweavers

1188 search results - page 70 / 238
» Generating Connectives
Sort
View
149
Voted
IAW
2003
IEEE
15 years 8 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
165
Voted
BROADNETS
2006
IEEE
15 years 7 months ago
SMART: An Optical Infrastructure for Future Internet
A new scalable optical network infrastructure SMART is proposed based on light-trails and hypernetwork architecture. The underlying physical network of SMART is a reconfigurable WD...
Si-Qing Zheng, Ashwin Gumaste
145
Voted
ISICT
2003
15 years 4 months ago
Intelligent access and mobility management in heterogeneous wireless networks using policy
The next generation of mobile networks will utilise multiple radio access technologies. These heterogeneous wireless networks will enable the user to seamlessly roam between the d...
Ken Murray, Rajiv Mathur, Dirk Pesch
120
Voted
JSAC
2007
83views more  JSAC 2007»
15 years 3 months ago
Constructing an optimal server set in structured peer-to-peer networks
— To achieve high performance and resilience to failures, a client can make connections with multiple servers simultaneously and receive different portions of the data from each ...
Seung Chul Han, Ye Xia
125
Voted
SIGMETRICS
2000
ACM
15 years 3 months ago
Minimizing the impact of orphan requests in e-commerce services
The most common problem of an overloaded electronic-commerce server is an increase in the response time perceived by customers, who may restart their requests hoping to get a fast...
E. Kraemer, Goedson T. Paixão, Dorgival Ola...