Sciweavers

3200 search results - page 382 / 640
» Scalable computing with parallel tasks
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
135
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Measurement-Based Peer-to-Peer Grouping for Networked Virtual Environment
Networked games are newly emerging and increasing applications in the Internet community. Multiplayer Online Game (MOG) is one of such applications that can accommodate many users...
Hajime Sogawa, Niwat Thepvilojanapong, Hiroki Sait...
153
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
93
Voted
HIPC
2005
Springer
15 years 9 months ago
The Potential of On-Chip Multiprocessing for QCD Machines
We explore the opportunities offered by current and forthcoming VLSI technologies to on-chip multiprocessing for Quantum Chromo Dynamics (QCD), a computational grand challenge for ...
Gianfranco Bilardi, Andrea Pietracaprina, Geppino ...
148
Voted
GCC
2004
Springer
15 years 9 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...