Sciweavers

7329 search results - page 1365 / 1466
» Network Extractor Protocols
Sort
View
HPCA
2003
IEEE
16 years 3 months ago
Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
175
Voted
SIGMOD
2007
ACM
106views Database» more  SIGMOD 2007»
16 years 3 months ago
Highly distributed XQuery with DXQ
Many modern applications, from Grid computing to RSS handling, need to support data processing in a distributed environment. Currently, most such applications are implemented usin...
Jérôme Siméon, Kristi Morton, ...
126
Voted
ICDCS
2009
IEEE
16 years 22 days ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
145
Voted
WISTP
2010
Springer
15 years 10 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...
ICDE
2009
IEEE
121views Database» more  ICDE 2009»
15 years 10 months ago
Scalability for Virtual Worlds
— Networked virtual environments (net-VEs) are the next wave of digital entertainment, with Massively Multiplayer Online Games (MMOs) a very popular instance. Current MMO archite...
Nitin Gupta 0003, Alan J. Demers, Johannes Gehrke,...
« Prev « First page 1365 / 1466 Last » Next »