Sciweavers

2200 search results - page 383 / 440
» Hop Integrity in Computer Networks
Sort
View
CCGRID
2003
IEEE
15 years 8 months ago
RelayCast: A Middleware for Application-level Multicast Services
Application-level multicast (ALM) is being increasingly recognized as a solution to support multipoint applications without the need for a network layer multicast protocol. Though...
Nodoka Mimura, Kiyohide Nakauchi, Hiroyuki Morikaw...
ICPPW
2003
IEEE
15 years 8 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
DAC
2003
ACM
15 years 8 months ago
Test application time and volume compression through seed overlapping
We propose in this paper an extension on the Scan Chain Concealment technique to further reduce test time and volume requirement. The proposed methodology stems from the architect...
Wenjing Rao, Ismet Bayraktaroglu, Alex Orailoglu
SAC
2003
ACM
15 years 8 months ago
Distributed Query Adaptation and Its Trade-offs
Adaptive query processing in large distributed systems has seen increasing importance due to the rising environmental fluctuations in a growing Internet. We describe Ginga, an ad...
Henrique Paques, Ling Liu, Calton Pu
CCS
2003
ACM
15 years 8 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang