Sciweavers

2251 search results - page 434 / 451
» Network Coding Based Data Distribution in WiMAX
Sort
View
115
Voted
CEC
2008
IEEE
15 years 8 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ICC
2008
IEEE
117views Communications» more  ICC 2008»
15 years 8 months ago
Semi-Blind Power Allocation for Digital Subscriber Lines
— Digital subscriber lines (DSL) are today one of the most important means for delivering high-speed data transmission. An emerging technique for dealing with one of the technolo...
Rodrigo Moraes, Boris Dortschy, Aldebaro Klautau, ...
IWIA
2005
IEEE
15 years 7 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
134
Voted
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
15 years 7 months ago
A Framework for Self-Optimizing Grids Using P2P Components
We present the framework of a new grid architecture based on the peer-to-peer and the component paradigms. In our architecture, several peer-to-peer components are loosely coupled...
Florian Schintke, Thorsten Schütt, Alexander ...
127
Voted
GRID
2003
Springer
15 years 7 months ago
Scoped and Approximate Queries in a Relational Grid Information Service
We are developing a grid information service, RGIS, that is based on the relational data model. RGIS supports complex queries written in SQL that search for compositions (using jo...
Dong Lu, Peter A. Dinda, Jason A. Skicewicz