Sciweavers

5234 search results - page 964 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICPP
2003
IEEE
15 years 8 months ago
Exploiting Client Caches: An Approach to Building Large Web Caches
New demands brought by the continuing growth of the Internet will be met in part by more effective and comprehensive use of caching. This paper proposes to exploit client browser ...
Yingwu Zhu, Yiming Hu
ICPPW
2003
IEEE
15 years 8 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
ICDCS
2002
IEEE
15 years 8 months ago
Query Optimization to Meet Performance Targets for Wide Area Applications
Recent technology advances have enabled mediated query processing with Internet accessible WebSources. A characteristic of WebSources is that their access costs exhibit transient ...
Vladimir Zadorozhny, Louiqa Raschid
ICDCSW
2002
IEEE
15 years 8 months ago
Extended Minimal Routing in 2-D Meshes with Faulty Blocks
In this paper, several enhanced sufficient conditions are given for minimal routing in 2-dimensional (2-D) meshes with faulty nodes contained in a set of disjoint faulty blocks. ...
Jie Wu, Zhen Jiang
IPPS
2002
IEEE
15 years 8 months ago
On Reliable and Scalable Peer-to-Peer Web Document Sharing
We propose a peer-to-peer Web document sharing technique, called “Browsers-Aware Proxy Server”. In this design, a proxy server connecting to a group of networked clients maint...
Li Xiao, Xiaodong Zhang, Zhichen Xu