Sciweavers

1748 search results - page 68 / 350
» Security Models for Heterogeneous Networking
Sort
View
110
Voted
MM
2006
ACM
89views Multimedia» more  MM 2006»
15 years 9 months ago
Towards scalable delivery of video streams to heterogeneous receivers
The required real-time and high-rate transfers for multimedia data severely limit the number of requests that can be serviced concurrently by Video-on-Demand (VOD) servers. Resour...
Bashar Qudah, Nabil J. Sarhan
RTCSA
2003
IEEE
15 years 8 months ago
An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters
Network of workstation (NOW) is a cost-effective alternative to massively parallel supercomputers. As commercially available off-theshelf processors become cheaper and faster, it...
Pangfeng Liu, Da-Wei Wang, Yi-Heng Guo
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
15 years 9 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
CCS
2007
ACM
15 years 9 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
JCP
2008
142views more  JCP 2008»
15 years 3 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami