Sciweavers

8493 search results - page 347 / 1699
» Implementing a distributed firewall
Sort
View
147
Voted
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 8 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
RAID
1999
Springer
15 years 8 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
132
Voted
PADS
1998
ACM
15 years 8 months ago
Fault-Tolerant Distributed Simulation
In traditional distributed simulation schemes, entire simulation needs to be restarted if any of the participating LP crashes. This is highly undesirable for long running simulati...
Om P. Damani, Vijay K. Garg
135
Voted
RTCSA
1997
IEEE
15 years 8 months ago
A distributed multimedia toolbox
Emphasis of our research lies on the application of realtime multimedia technology: tele-teaching. teleconferencing arid collaborative work. To support this research we need a rea...
Hans Scholten, Pierre G. Jansen
SPDP
1996
IEEE
15 years 8 months ago
Impact Of Load Balancing On Unstructured Adaptive Grid Computations For Distributed-Memory Multiprocessors
The computational requirements for an adaptive solution of unsteady problems change as the simulation progresses. This causes workload imbalance among processors on a parallel mac...
Andrew Sohn, Rupak Biswas, Horst D. Simon