Sciweavers

2281 search results - page 404 / 457
» Security Patterns and Secure Systems Design
Sort
View
125
Voted
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
15 years 9 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
120
Voted
ACMSE
2006
ACM
15 years 9 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 9 months ago
Identifying Facilitators and Inhibitors of Market Structure Change: A Hybrid Theory of Unbiased Electronic Markets
The electronic markets hypothesis (EMH) in the information systems (IS) literature suggests that information technology (IT) will reduce coordination costs across firms, leading t...
Nelson F. Granados, Alok Gupta, Robert J. Kauffman
SIGECOM
2004
ACM
77views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Stopping outgoing spam
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...
Joshua T. Goodman, Robert Rounthwaite
112
Voted
CCGRID
2003
IEEE
15 years 8 months ago
Recovering Internet Symmetry in Distributed Computing
This paper describes two systems to recover the Internet connectivity impaired by private networks and firewalls. These devices cause asymmetry in the Internet, making peer-to-pee...
Se-Chang Son, Miron Livny