Sciweavers

1169 search results - page 191 / 234
» Migration without Virtualization
Sort
View
IJNSEC
2008
72views more  IJNSEC 2008»
15 years 1 months ago
Bandwidth-Conserving Multicast VoIP Teleconference System
Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while...
Teck-Kuen Chua, David C. Pheanis
ISI
2008
Springer
15 years 1 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
JNW
2006
120views more  JNW 2006»
15 years 1 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
ENGL
2007
112views more  ENGL 2007»
15 years 1 months ago
Cooperative Transmission Scheme to Increase Gain by Using STBC
— Multiple-Input Multiple-Output (MIMO) systems are composed of source and destination nodes with multiple antennas. But, when nodes cannot support multiple antennas due to size ...
Ho-Jung An, Jee-Hoon Kim, Hyoung-Kyu Song
JOT
2006
121views more  JOT 2006»
15 years 1 months ago
Constructing persistent object-oriented models with standard C++
In this paper, it is suggested an approach and a design pattern for developing object-oriented models that need to be persistent, including the databases of moderate size, with us...
Alexander Kozynchenko