Sciweavers

635 search results - page 7 / 127
» A network efficiency measure with application to critical in...
Sort
View
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
14 years 10 months ago
Substring Matching in P2P Publish/Subscribe Data Management Networks
The content-based publish/subscribe (pub/sub) paradigm for system design is becoming increasingly popular, offering unique benefits for a large number of data-intensive applicatio...
Ioannis Aekaterinidis, Peter Triantafillou
COMCOM
2006
94views more  COMCOM 2006»
13 years 8 months ago
Estimation of network distances using off-line measurements
Several emerging large-scale Internet applications such as Content Distribution Networks, and Peerto-Peer networks could potentially benefit from knowing the underlying Internet t...
Prasun Sinha, Danny Raz, Nidhan Choudhuri
MSWIM
2005
ACM
14 years 2 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 7 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
ACSAC
2003
IEEE
14 years 1 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...