Sciweavers

1266 search results - page 50 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
MSS
2000
IEEE
106views Hardware» more  MSS 2000»
15 years 9 months ago
Disk Subsystem Performance Evaluation: From Disk Drives to Storage Area Networks
Disk subsystems span the range of configuration complexity from single disk drives to large installations of disk arrays. They can be directly attached to individual computer syst...
Thomas Ruwart
CSE
2009
IEEE
16 years 5 days ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
HPCC
2005
Springer
15 years 11 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
ICC
2009
IEEE
179views Communications» more  ICC 2009»
16 years 4 days ago
Distributed Power Control for Interference-Limited Cooperative Relay Networks
— In this paper, a distributed power control algorithm is proposed for wireless relay networks in interference-limited environments. The objective is to minimize the total transm...
Sheng Zhou, Hongda Xiao, Zhisheng Niu
RTAS
2006
IEEE
15 years 11 months ago
Scalable Modeling and Performance Evaluation of Wireless Sensor Networks
A notable features of many proposed Wireless Sensor Networks (WSNs) deployments is their scale: hundreds to thousands of nodes linked together. In such systems, modeling the state...
YoungMin Kwon, Gul Agha