Sciweavers

1506 search results - page 161 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
IM
2007
13 years 10 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
14 years 21 days ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
GLOBECOM
2006
IEEE
14 years 3 months ago
A Distributed Policy Based Solution in a Fault Management Scenario
– The Madeira project, part of the Celtic Initiative1 , investigates the use of a fully distributed, policy-based network management framework that exploits the peer-to-peer para...
Ricardo Marin, Julio Vivero, Hai Nguyen, Joan Serr...
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
FOIS
2010
13 years 10 months ago
Ontologies for Distributed Command and Control Messaging
This paper presents the development of a set of ontologies for use in messaging systems within military and emergency first responder command and control applications. These ontolo...
Duc N. Nguyen, Joseph B. Kopena, Boon Thau Loo, Wi...