Sciweavers

196 search results - page 32 / 40
» A Fractal Immune Network
Sort
View
IPOM
2007
Springer
14 years 1 months ago
Measurement and Analysis of Intraflow Performance Characteristics of Wireless Traffic
It is by now widely accepted that the arrival process of aggregate network traffic exhibits self-similar characteristics which result in the preservation of traffic burstiness (hig...
Dimitrios P. Pezaros, Manolis Sifalakis, David Hut...
SRDS
2008
IEEE
14 years 2 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
ICAC
2006
IEEE
14 years 1 months ago
Collaborative Self-Organization by Devices Providing Document Services - A Multi-Agent Perspective
— In a service oriented environment such as the realm of document services, the conventional notion is that of a multi-function device interacting individually with customer appl...
Nathan Gnanasambandam, Naveen Sharma, Soundar R. T...
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
14 years 1 months ago
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
This paper presents a high-availability system architecture called INDRA — an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor ...
Weidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmo...
ICDM
2010
IEEE
105views Data Mining» more  ICDM 2010»
13 years 5 months ago
On the Vulnerability of Large Graphs
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (...
Hanghang Tong, B. Aditya Prakash, Charalampos E. T...