Sciweavers

738 search results - page 60 / 148
» Comparison of Approaches to Service Deployment
Sort
View
DISCEX
2003
IEEE
14 years 2 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
13 years 8 months ago
BM-ALM: An Application Layer Multicasting with Behavior Monitoring Approach
IP multicasting is the most efficient way to perform group data distribution, as it eliminates traffic redundancy and improves bandwidth utilization. Application Layer Multicast (...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
INFOCOM
2000
IEEE
14 years 1 months ago
REUNITE: A Recursive Unicast Approach to Multicast
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...
Ion Stoica, T. S. Eugene Ng, Hui Zhang
DATE
2010
IEEE
142views Hardware» more  DATE 2010»
13 years 9 months ago
Transition-aware real-time task scheduling for reconfigurable embedded systems
—Due to increase in demand for reconfigurability in embedded systems, real-time task scheduling is challenged by non-negligible reconfiguration overheads. If such overheads are n...
Hessam Kooti, Elaheh Bozorgzadeh, Shenghui Liao, L...
EAAI
2007
87views more  EAAI 2007»
13 years 8 months ago
Experience-based service provider selection in agent-mediated E-Commerce
For a given service demand, it is necessary to select a suitable service provider among many possibilities. An accurate selection is difficult when consumers do not have a signi...
Murat Sensoy, F. Canan Pembe, Hande Zirtiloglu, Pi...