Sciweavers

823 search results - page 39 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
CCR
2005
126views more  CCR 2005»
13 years 8 months ago
Large scale content distribution protocols
This paper introduces large scale content distribution protocols, which are capable of scaling to massive numbers of users and providing low delay end-to-end delivery. Delivery of...
Christoph Neumann, Vincent Roca, Rod Walsh
GCC
2003
Springer
14 years 1 months ago
Improving the Objects Set Availability in the P2P Environment by Multiple Groups
The availability is often used to measure how well a system can provide the service continuously. The measures of availability for a single computer and for multiple computers are ...
Kang Chen, Shuming Shi, Guangwen Yang, Meiming She...
DSOM
2006
Springer
13 years 12 months ago
Efficient Information Retrieval in Network Management Using Web Services
Abstract. Web Services is an XML-based technology that has attracted significant attention for building distributed Internet services. There have also been significant efforts tryi...
Aimilios Chourmouziadis, George Pavlou
ICPADS
2005
IEEE
14 years 1 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
ADC
2003
Springer
123views Database» more  ADC 2003»
14 years 1 months ago
Transactions in Loosely Coupled Distributed Systems
An exciting trend in enterprise computing lies in the integration of applications across an organisation and even between organisations. This allows the provision of services by a...
Alan Fekete, Paul Greenfield, Dean Kuo, Julian Jan...