Sciweavers

738 search results - page 30 / 148
» Comparison of Approaches to Service Deployment
Sort
View
ICNP
2002
IEEE
14 years 2 months ago
Attacking DDoS at the Source
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects an...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
AINA
2007
IEEE
14 years 3 months ago
Comparative Evaluation of Converged Service-Oriented Architectures
In this paper we evaluate and compare five commercial off-the-shelf platforms for building converged serviceoriented architectures in an ambient computing environment. To this en...
Davy Preuveneers, Julien Pauty, Dimitri Van Landuy...
ESORICS
2009
Springer
13 years 7 months ago
Anonymity and Historical-Anonymity in Location-Based Services
The problem of protecting user's privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this cont...
Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wa...
JCIT
2007
142views more  JCIT 2007»
13 years 9 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
CCGRID
2010
IEEE
13 years 10 months ago
An Effective Architecture for Automated Appliance Management System Applying Ontology-Based Cloud Discovery
Cloud computing is a computing paradigm which allows access of computing elements and storages on-demand over the Internet. Virtual Appliances, pre-configured, readyto-run applicat...
Amir Vahid Dastjerdi, Sayed Gholam Hassan Tabataba...