Sciweavers

6312 search results - page 1107 / 1263
» A design framework for metaheuristics
Sort
View
JSAC
2006
111views more  JSAC 2006»
13 years 10 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
JSS
2006
104views more  JSS 2006»
13 years 10 months ago
Modelling and simulation of off-chip communication architectures for high-speed packet processors
In this work, we propose a visual, custom-designed, event-driven interconnect simulation framework to evaluate the performance of off-chip multi-processor/memory communications ar...
Jacob Engel, Daniel Lacks, Taskin Koçak
JWSR
2006
114views more  JWSR 2006»
13 years 10 months ago
Metadata, Ontologies, and Information Models for Grid PSE Toolkits Based on Web Services
: A PSE toolkit is a group of technologies within a software architecture through which multiple PSEs can be built for different application domains. The effective use of a PSE too...
Carmela Comito, Carlo Mastroianni, Domenico Talia
NETWORK
2008
94views more  NETWORK 2008»
13 years 10 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
FGCS
2007
92views more  FGCS 2007»
13 years 10 months ago
Optimizing Web Service messaging performance in mobile computing
— The performance and efficiency of Web Services can be greatly increased in conversational and streaming message exchanges by streaming the message exchange paradigm. In this pa...
Sangyoon Oh, Geoffrey Fox
« Prev « First page 1107 / 1263 Last » Next »