Sciweavers

1874 search results - page 235 / 375
» Network optimization for DHT-based applications
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 3 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
POLICY
2001
Springer
15 years 8 months ago
Taxonomy and Description of Policy Combination Methods
To control complicated and decomposable networking functions, such as Diffserv, two or more policies must cooperate. Combining two or more mutually dependent policies for a specifi...
Yasusi Kanada
ECWEB
2000
Springer
372views ECommerce» more  ECWEB 2000»
15 years 8 months ago
Mobile Electronic Commerce: Emerging Issues
Abstract. There are many definitions for Mobile Electronic Commerce (MCommerce). We define M-Commerce as any type of transaction of an economic value having at least at one end a m...
Aphrodite Tsalgatidou, Jari Veijalainen
129
Voted
HPCN
1997
Springer
15 years 7 months ago
Parallel Simulation of Ion Recombination in Nonpolar Liquids
Abstract. Ion recombination in nonpolar liquids is an important problem in radiation chemistry. We have designed and implemented a parallel Monte Carlo simulation for this computat...
Frank J. Seinstra, Henri E. Bal, Hans J. W. Spoeld...
150
Voted
SENSYS
2003
ACM
15 years 9 months ago
DFuse: a framework for distributed data fusion
Simple in-network data aggregation (or fusion) techniques for sensor networks have been the focus of several recent research efforts, but they are insufficient to support advance...
Rajnish Kumar, Matthew Wolenetz, Bikash Agarwalla,...