Sciweavers

4052 search results - page 718 / 811
» Using RDF to describe networks
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ACSD
2003
IEEE
151views Hardware» more  ACSD 2003»
15 years 3 months ago
Communicating Transaction Processes
Message Sequence Charts (MSC) have been traditionally used to depict execution scenarios in the early stages of design cycle. MSCs portray inter-process ( inter-object) interactio...
Abhik Roychoudhury, P. S. Thiagarajan
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
15 years 3 months ago
A First Person IP over HDSL Case Study
As many authors have articulated, the “last mile problem” is often cited as a persistent engineering obstacle in deploying residential broadband solutions. Additionally, some ...
Wayne Smith
HPDC
2003
IEEE
15 years 3 months ago
The Ethernet Approach to Grid Computing
Despite many competitors, Ethernet became the dominant protocol for local area networking due to its simplicity, robustness, and efficiency in wide variety of conditions and tech...
Douglas Thain, Miron Livny
ICPPW
2003
IEEE
15 years 3 months ago
Load Balancing on PC Clusters with the Super-Programming Model
Recent work in high-performance computing has shifted attention to PC clusters.. For PC-clusters, member nodes are independent computers connected by generalpurpose networks. The ...
Dejiang Jin, Sotirios G. Ziavras