Sciweavers

968 search results - page 119 / 194
» Infrastructure for the quantum internet
Sort
View
APNOMS
2009
Springer
15 years 4 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
EPEW
2009
Springer
15 years 4 months ago
Modelling Zoned RAID Systems Using Fork-Join Queueing Simulation
Abstract. RAID systems are ubiquitously deployed in storage environments, both as standalone storage solutions and as fundamental components of virtualised storage platforms. Accur...
Abigail S. Lebrecht, Nicholas J. Dingle, William J...
OTM
2009
Springer
15 years 4 months ago
CLON: Overlay Networks and Gossip Protocols for Cloud Environments
Although epidemic or gossip-based multicast is a robust and scalable approach to reliable data dissemination, its inherent redundancy results in high resource consumption on both ...
Miguel Matos, António Sousa, José Pe...
SEMWEB
2009
Springer
15 years 4 months ago
Results of OKKAM Feature based Entity Matching Algorithm for Instance Matching Contest of OAEI 2009
To investigate the problem of entity recognition, we deal with the creation of the so-called Entity Name System (ENS) which is an open, public back-bone infrastructure for the (Sem...
Heiko Stoermer, Nataliya Rassadko