Sciweavers

7992 search results - page 1582 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
TDSC
2010
218views more  TDSC 2010»
13 years 5 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
IMC
2010
ACM
13 years 5 months ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
IMC
2010
ACM
13 years 5 months ago
Measurement of loss pairs in network paths
Loss-pair measurement was proposed a decade ago for discovering network path properties, such as a router's buffer size. A packet pair is regarded as a loss pair if exactly o...
Edmond W. W. Chan, Xiapu Luo, Weichao Li, Waiting ...
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
CANDC
2009
ACM
13 years 5 months ago
A tale of two online communities: fostering collaboration and creativity in scientists and children
There has been much recent interest in the development of tools to foster remote collaboration and shared creative work. An open question is: what are the guidelines for this proc...
Cecilia R. Aragon, Sarah S. Poon, Andrés Mo...
« Prev « First page 1582 / 1599 Last » Next »