Sciweavers

476 search results - page 84 / 96
» iOPEN Network: Operation Mechanisms and Experimental Study
Sort
View
79
Voted
COMPSAC
2002
IEEE
15 years 5 months ago
SIFA: A Scalable File System with Intelligent File Allocation
In this paper, we propose and evaluate a new NAS based system which is a consolidated file system in a network environment. The consolidated file system utilizes storage boxes c...
Hsiao-Ping Tsai, Jiun-Long Huang, Cheng-Ming Chao,...
ANSS
2008
IEEE
15 years 7 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
IPPS
1999
IEEE
15 years 4 months ago
Implementation of a Virtual Time Synchronizer for Distributed Databases
The availability of high speed networks and improved microprocessor performance have made it possible to build inexpensive cluster of workstations as an appealing platform for par...
Azzedine Boukerche, Sajal K. Das, Ajoy Kumar Datta...
INFOCOM
2008
IEEE
15 years 6 months ago
Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics
Abstract—The split of a multihop, point to point TCP connection consists in replacing a plain, end-to-end TCP connection by a cascade of TCP connections. In such a cascade, conne...
François Baccelli, Giovanna Carofiglio, Ser...
107
Voted
IDEAL
2003
Springer
15 years 5 months ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...