Sciweavers

1314 search results - page 235 / 263
» New Approaches for Virtual Private Network Design
Sort
View
CF
2007
ACM
15 years 5 months ago
Reconfigurable hybrid interconnection for static and dynamic scientific applications
As we enter the era of petascale computing, system architects must plan for machines composed of tens or even hundreds of thousands of processors. Although fully connected network...
Shoaib Kamil, Ali Pinar, Daniel Gunter, Michael Li...
RAID
2005
Springer
15 years 7 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
INFOCOM
1999
IEEE
15 years 6 months ago
Inter-Class Resource Sharing using Statistical Service Envelopes
Networks that support multiple services through "link-sharing" must address the fundamental conflicting requirement between isolation among service classes to satisfy ea...
Jingyu Qiu, Edward W. Knightly
129
Voted
CSREAPSC
2006
15 years 3 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
CCR
2008
77views more  CCR 2008»
15 years 1 months ago
What would Darwin think about clean-slate architectures?
As significant resources are directed towards clean-slate networking research, it is imperative to understand how cleanslate architectural research compares to the diametrically o...
Constantine Dovrolis