Sciweavers

2200 search results - page 330 / 440
» Hop Integrity in Computer Networks
Sort
View
131
Voted
NCA
2008
IEEE
15 years 9 months ago
Identifying Failures in Grids through Monitoring and Ranking
In this paper we present FailRank, a novel framework for integrating and ranking information sources that characterize failures in a grid system. After the failing sites have been...
Demetrios Zeinalipour-Yazti, Kyriakos Neocleous, C...
ICNS
2006
IEEE
15 years 9 months ago
Pervasive Service Platform (PSP): Facilitating Pervasive Services
— Pervasive computing is a new and emerging technology. The concept of pervasiveness and its deployment into reality are still not well aligned. This is because the vision of per...
Fiona Mahon, Jelena Mitic, Micheal Crotty, Kevin D...
176
Voted
HICSS
2003
IEEE
183views Biometrics» more  HICSS 2003»
15 years 8 months ago
CRMA: A Cycle-breaking Multicast Routing Algorithm for Supporting QoS over the Internet
Multicasting is an efficient and effective approach for supporting content distribution based on the current Internet infrastructure. In this paper, we have proposes the source-in...
Jian Zhao, Hossam S. Hassanein, Jieyi Wu, Junzhou ...
ISCC
2003
IEEE
130views Communications» more  ISCC 2003»
15 years 8 months ago
Congestion-Aware Multicast Routing for Supporting QoS over the Internet
Multicasting is an efficient and effective approach for supporting content distribution based on the current Internet infrastructure. In this paper, we have proposes the source-in...
Jian Zhao, Hossam S. Hassanein, Jieyi Wu, Junzhou ...
NDSS
2002
IEEE
15 years 8 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman