Sciweavers

14824 search results - page 2938 / 2965
» Security - Introduction
Sort
View
103
Voted
COMPUTER
1999
95views more  COMPUTER 1999»
15 years 4 days ago
Wide-Area Computing: Resource Sharing on a Large Scale
abstract over a complex set of resources and provide a high-level way to share and manage them over the network. To be effective, such a system must address the challenges posed by...
Andrew S. Grimshaw, Adam Ferrari, Frederick Knabe,...
117
Voted
SIGCSE
2002
ACM
134views Education» more  SIGCSE 2002»
15 years 3 days ago
Internationalization of the curriculum report of a project within computer science
In the Fall of 1999 the Center for Excellence in Undergraduate Teaching (CEUT) and the International Office at Virginia Tech provided a small grant to support the incorporation of...
John A. N. Lee
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
15 years 3 days ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
130
Voted
TON
2002
144views more  TON 2002»
15 years 3 days ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...
COMCOM
2008
135views more  COMCOM 2008»
15 years 1 days ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
« Prev « First page 2938 / 2965 Last » Next »