Sciweavers

182 search results - page 31 / 37
» Identity the Civic Scenario
Sort
View
CN
2007
91views more  CN 2007»
14 years 9 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
JNW
2008
177views more  JNW 2008»
14 years 9 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
JUCS
2008
149views more  JUCS 2008»
14 years 9 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
WWW
2007
ACM
15 years 10 months ago
Globetp: template-based database replication for scalable web applications
Generic database replication algorithms do not scale linearly in throughput as all update, deletion and insertion (UDI) queries must be applied to every database replica. The thro...
Tobias Groothuyse, Swaminathan Sivasubramanian, Gu...
130
Voted
ICCD
2008
IEEE
420views Hardware» more  ICCD 2008»
15 years 6 months ago
Frequency and voltage planning for multi-core processors under thermal constraints
— Clock frequency and transistor density increases have resulted in elevated chip temperatures. In order to meet temperature constraints while still exploiting the performance op...
Michael Kadin, Sherief Reda