Sciweavers

2560 search results - page 132 / 512
» Securing VO Management
Sort
View
DFN
2009
15 years 5 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
CCR
2008
94views more  CCR 2008»
15 years 4 months ago
ECHOS: edge capacity hosting overlays of nano data centers
In this paper we propose a radical solution to data hosting and delivery for the Internet of the future. The current data delivery architecture is "network centric", wit...
Nikolaos Laoutaris, Pablo Rodriguez, Laurent Masso...
IDT
2007
83views more  IDT 2007»
15 years 4 months ago
Negotiating flexible agreements by combining distributive and integrative negotiation
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
Quoc Bao Vo, Lin Padgham, Lawrence Cavedon
CCR
2004
100views more  CCR 2004»
15 years 4 months ago
A real options framework to value network, protocol, and service architecture
This paper proposes a real options framework for evaluating architectural choices and the economic value of these alternative choices of networks, protocols, and services. Using p...
Mark Gaynor, Scott Bradner
SECON
2010
IEEE
15 years 2 months ago
A Robust Push-To-Talk Service for Wireless Mesh Networks
Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other while using a si...
Yair Amir, Raluca Musaloiu-Elefteri, Nilo Rivera