Sciweavers

4085 search results - page 713 / 817
» Data Services - From Data to Containers
Sort
View
CEC
2008
IEEE
15 years 10 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
124
Voted
DSN
2008
IEEE
15 years 10 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
GLOBECOM
2008
IEEE
15 years 10 months ago
Networked Embedded Systems: A Quantitative Performance Comparison
— Networked embedded systems are gaining more and more attention and their use in current network scenarios is of indisputable importance. Research community and industry are pro...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
HPDC
2008
IEEE
15 years 10 months ago
Managing SLAs of heterogeneous workloads using dynamic application placement
In this paper we address the problem of managing heterogeneous workloads in a virtualized data center. We consider two different workloads: transactional applications and long-ru...
David Carrera, Malgorzata Steinder, Ian Whalley, J...
ICCCN
2008
IEEE
15 years 10 months ago
Performance Study of Unstructured P2P Overlay Streaming Systems
—One of the major differences among current P2P solutions for multimedia streaming is the way they organize the exchange of multimedia data among their peers. We compare the perf...
Purvi Shah, Jawad Rasheed, Jehan-François P...