Sciweavers

1127 search results - page 178 / 226
» New Algorithms for Generalized Network Flows
Sort
View
117
Voted
MOBICOM
2004
ACM
15 years 5 months ago
Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs
With the growth of IEEE 802.11-based wireless LANs, VoIP and similar applications are now commonly used over wireless networks. Mobile station performs a handoff whenever it move...
Sangho Shin, Andrea G. Forte, Anshuman Singh Rawat...
105
Voted
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 6 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
CCS
2006
ACM
15 years 4 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
98
Voted
WWW
2002
ACM
16 years 1 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
143
Voted
PODS
2005
ACM
211views Database» more  PODS 2005»
16 years 18 days ago
Join-distinct aggregate estimation over update streams
There is growing interest in algorithms for processing and querying continuous data streams (i.e., data that is seen only once in a fixed order) with limited memory resources. Pro...
Sumit Ganguly, Minos N. Garofalakis, Amit Kumar, R...