Sciweavers

14824 search results - page 2924 / 2965
» Security - Introduction
Sort
View
BMCBI
2006
109views more  BMCBI 2006»
15 years 17 days ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...
77
Voted
CN
2006
79views more  CN 2006»
15 years 17 days ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
95
Voted
COMCOM
2006
121views more  COMCOM 2006»
15 years 17 days ago
Load-balanced agent activation for value-added network services
In relation to its growth in size and user population, the Internet faces new challenges that have triggered the proposals of value-added network services, e.g., IP multicast, IP ...
Chao Gong, Kamil Saraç, Ovidiu Daescu, Bala...
110
Voted
COMCOM
2006
121views more  COMCOM 2006»
15 years 17 days ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
COMCOM
2006
154views more  COMCOM 2006»
15 years 17 days ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
« Prev « First page 2924 / 2965 Last » Next »