Sciweavers

988 search results - page 185 / 198
» A Network Service Access Control Framework Based on Network ...
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 1 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
ISPDC
2005
IEEE
14 years 1 months ago
Adaptive window scheduling for a hierarchical agent system
DIET (Distributed Interactive Engineering Toolbox) is a toolbox for the construction of Network Enabled Server (NES) systems. For most NES systems, as for most grid middleware sys...
Holly Dail, Frederic Desprez
HPCA
2006
IEEE
14 years 8 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
INFOCOM
2006
IEEE
14 years 1 months ago
Flow Scheduling for End-Host Multihoming
Abstract— Fueled by the competing DSL and Cable technologies, residential broadband access has seen a significant spread in availability to the point that many users have a choi...
Nathanael Thompson, Guanghui He, Haiyun Luo
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
14 years 2 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...