Sciweavers

738 search results - page 111 / 148
» Comparison of Approaches to Service Deployment
Sort
View
ISW
2005
Springer
14 years 2 months ago
gore: Routing-Assisted Defense Against DDoS Attacks
Abstract. We present gore, a routing-assisted defense architecture against distributed denial of service (DDoS) attacks that provides guaranteed levels of access to a network under...
Stephen T. Chou, Angelos Stavrou, John Ioannidis, ...
BMCBI
2010
149views more  BMCBI 2010»
13 years 8 months ago
KID - an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information o
Background: The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger ...
Stephanie Heinen, Bernhard Thielen, Dietmar Schomb...
IADIS
2004
13 years 10 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
CCR
2004
95views more  CCR 2004»
13 years 8 months ago
A Per-Domain Behavior for circuit emulation in IP networks
Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of...
Kathleen M. Nichols, Van Jacobson, Kedarnath Podur...
WWW
2009
ACM
14 years 9 months ago
Personalized recommendation on dynamic content using predictive bilinear models
In Web-based services of dynamic content (such as news articles), recommender systems face the difficulty of timely identifying new items of high-quality and providing recommendat...
Wei Chu, Seung-Taek Park