Sciweavers

2522 search results - page 153 / 505
» Tools for Heterogeneous Network Computing
Sort
View
CCS
2007
ACM
15 years 11 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
LCN
1999
IEEE
15 years 9 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix
CCGRID
2005
IEEE
15 years 10 months ago
P3: P2P-based middleware enabling transfer and aggregation of computational resources
This paper presents middleware enabling mutual and equal transfer of computing power between individuals, as in the original idea behind P2P, while also supporting large-scale dis...
Kazuyuki Shudo, Yoshio Tanaka, Satoshi Sekiguchi
CN
2004
109views more  CN 2004»
15 years 4 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
LCN
2006
IEEE
15 years 11 months ago
A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc Networks
This paper investigates the problem of how to improve TCP performance in multi-rate Ad-hoc networks with congested links. To improve network performance, different rate adaptation...
Timo Zauner, Luke Haslett, Wen Hu, Sanjay Jha, Cor...