147 views128 votes15 years 7 months ago RAID 2001»
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
112 views108 votes15 years 8 months ago WMCSA 2002»
MOPED (MObile grouPEd Device) is a network model that treats a user’s set of personal devices as a single, virtual device. The nodes of the MOPED dynamically aggregate available...
Abstract: This paper presents the information aggregation methods enabling cost- and QoS-aware service deployment. It is expected that network management tools will require the net...
153 views127 votes15 years 4 months ago SNPD 2008»
Peer-to-Peer file sharing applications, which enable peers to establish multiple TCP connections between other peers to transfer data, pose new challenge to congestion control. Si...
124 views123 votes15 years 8 months ago DEXA 2005»
Computing aggregates over distributed data sets constitutes an interesting class of distributed queries. Recent advances in peer-to-peer discovery of data sources and query process...
188 views150 votes15 years 7 months ago WCNC 2010»
—Enabling users to connect to the best available network, dynamic network selection scheme is important for satisfying various quality of service (QoS) requirements, achieving se...
141 views152 votes15 years 9 months ago HICSS 2007»
Abstract— Social decision support systems are able to aggregate the local perspectives of a diverse group of individuals into a global social decision. This paper presents a mult...
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...