163 views143 votes15 years 9 months ago IPPS 2006»
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
128 views134 votes15 years 3 months ago IJAHUC 2006»
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
92 views109 votes15 years 4 months ago IJCAI 2003»
We present a coherent framework for data clustering. Starting with a Hopfield network, we show the solutions for several well-motivated clustering objective functions are principa...
The problem of regulating air traffic in the en route airspace of the National Airspace System is studied using an Eulerian network model to describe air traffic flow. The evolutio...
Wireless sensor networks (WSNs) can provide real-time information about geospatial environments, and so have the potential to play an important role in the monitoring of geographi...
109 views106 votes15 years 8 months ago HICSS 2002»
We analyze alternative market designs for a multisettlement system for electricity in which the resolution of the transmission network model is increased as time approaches real-t...
In this paper we study the Optical Burst Switching (OBS) paradigm for the support of the TCP flows in an All Optical Network (AON). We analyze the TCP send rate, i.e. the amount of...
The current Internet infrastructure has very few built-in protection mechanisms and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated ...