Sciweavers

464 search results - page 51 / 93
» Teaching an engineering approach for network computing
Sort
View
RAID
2010
Springer
14 years 10 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
IMC
2004
ACM
15 years 5 months ago
Identifying elephant flows through periodically sampled packets
Identifying elephant flows is very important in developing effective and efficient traffic engineering schemes. In addition, obtaining the statistics of these flows is also ver...
Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jia...
ANCS
2006
ACM
15 years 3 months ago
Packet pre-filtering for network intrusion detection
As Intrusion Detection Systems (IDS) utilize more complex syntax to efficiently describe complex attacks, their processing requirements increase rapidly. Hardware and, even more, ...
Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N....
ICDCSW
2007
IEEE
15 years 3 months ago
A Concept for Flexible Event-Driven Invocation of Distributed Service Compositions
Currently, flexible service compositions are invoked in a centralised manner by process execution engines. Although this approach is widely used for orchestrating web services, it...
Karen Walzer, Jürgen Anke, Alexander Lös...
WCNC
2010
IEEE
14 years 9 months ago
Addressing Response Time and Video Quality in Remote Server Based Internet Mobile Gaming
A new remote server based gaming approach, where the responsibility of executing the gaming engines is put on remote servers instead of the mobile devices, has the potential for en...
Shaoxuan Wang, Sujit Dey