Sciweavers

2112 search results - page 102 / 423
» Communication networks in geographically distributed softwar...
Sort
View
137
Voted
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 11 months ago
Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks
— Distributed Denial of Service attacks pose a serious threat to many businesses which rely on constant availability of their network services. Companies like Google, Yahoo and A...
Stefan Seufert, Darragh O'Brien
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
16 years 5 months ago
Bypass Caching: Making Scientific Databases Good Network Citizens
Scientific database federations are geographically distributed and network bound. Thus, they could benefit from proxy caching. However, existing caching techniques are not suitabl...
Tanu Malik, Randal C. Burns, Amitabh Chaudhary
148
Voted
GROUP
2005
ACM
15 years 10 months ago
Seeking the source: software source code as a social and technical artifact
In distributed software development, two sorts of dependencies can arise. The structure of the software system itself can create dependencies between software elements, while the ...
Cleidson R. B. de Souza, Jon Froehlich, Paul Douri...
ICESS
2007
Springer
15 years 10 months ago
Intra Routing Protocol with Hierarchical and Distributed Caching in Nested Mobile Networks
Abstract. We propose a novel route optimization protocol for intraNEMO communication using a hierarchical and distributed caching scheme. The proposed scheme employs the routing ca...
Hyemee Park, Moonseong Kim, Hyunseung Choo
133
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
Routing Over Multi-Hop Wireless Networks with Non-Ergodic Mobility
—Routing to mobile nodes in a wireless network is conventionally performed by associating a static IP address (or a geographic location) to each node, and routing to that address...
Chris Milling, Sundar Subramanian, Sanjay Shakkott...