Sciweavers

5234 search results - page 798 / 1047
» Simulation of Computer Network Attacks
Sort
View
203
Voted
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 11 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
133
Voted
BROADNETS
2007
IEEE
15 years 11 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
149
Voted
IPPS
2005
IEEE
15 years 10 months ago
Distributed Data Streams Indexing using Content-Based Routing Paradigm
In recent years, we have seen a dramatic increase in the use of data-centric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and vari...
Ahmet Bulut, Ambuj K. Singh, Roman Vitenberg
SC
2004
ACM
15 years 10 months ago
A Peer-to-Peer Replica Location Service Based on a Distributed Hash Table
A Replica Location Service (RLS) allows registration and discovery of data replicas. In earlier work, we proposed an RLS framework and described the performance and scalability of...
Min Cai, Ann L. Chervenak, Martin R. Frank
NOSSDAV
2004
Springer
15 years 10 months ago
Considering altruism in peer-to-peer internet streaming broadcast
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
Yang-Hua Chu, Hui Zhang