Sciweavers

1006 search results - page 151 / 202
» Optimizing Performance of Web Service Providers
Sort
View
139
Voted
COMCOM
2008
145views more  COMCOM 2008»
15 years 3 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
139
Voted
P2P
2010
IEEE
127views Communications» more  P2P 2010»
15 years 1 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
145
Voted
OWLED
2008
15 years 4 months ago
Owlgres: A Scalable OWL Reasoner
Abstract. We present Owlgres, a DL-Lite reasoner implementation written for PostgreSQL, a mature open source database. Owlgres is an OWL reasoner that provides consistency checking...
Markus Stocker, Michael Smith
SEC
2000
15 years 4 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent
129
Voted
EUROSYS
2007
ACM
16 years 14 days ago
Latency and bandwidth-minimizing failure detectors
Failure detectors are fundamental building blocks in distributed systems. Multi-node failure detectors, where the detector is tasked with monitoring N other nodes, play a critical...
Kelvin C. W. So, Emin Gün Sirer