Sciweavers

1639 search results - page 300 / 328
» internet 2006
Sort
View
JOT
2006
80views more  JOT 2006»
14 years 9 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
JPDC
2006
253views more  JPDC 2006»
14 years 9 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
JSA
2006
82views more  JSA 2006»
14 years 9 months ago
A flocking based algorithm for document clustering analysis
ct 7 Social animals or insects in nature often exhibit a form of emergent collective behavior known as flocking. In this paper, 8 we present a novel Flocking based approach for doc...
Xiaohui Cui, Jinzhu Gao, Thomas E. Potok
JSAC
2006
112views more  JSAC 2006»
14 years 9 months ago
Performance Optimizations for Deploying VoIP Services in Mesh Networks
In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same voice-over-Internet protocol (V...
Samrat Ganguly, Vishnu Navda, Kyungtae Kim, Anand ...
JSAC
2006
105views more  JSAC 2006»
14 years 9 months ago
Network Topology Inference Based on End-to-End Measurements
Abstract--We consider using traceroute-like end-to-end measurement to infer the underlay topology for a group of hosts. One major issue is the measurement cost. Given hosts in an a...
Xing Jin, Wai-Pun Ken Yiu, S.-H. Gary Chan, Yajun ...