Sciweavers

569 search results - page 59 / 114
» Evaluating Cluster-based Network Servers
Sort
View
TRIDENTCOM
2010
IEEE
13 years 7 months ago
Experimental Validation and Assessment of Multi-domain and Multi-layer Path Computation
Within the framework of the BONE European Network of Excellence, we setup a multi-domain multi-layer testbed covering three different networks at two distinct locations in Europe. ...
Sebastian Gunreben, Ramon Casellas, Ricardo Mart&i...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 4 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
RAID
2005
Springer
14 years 3 months ago
Behavioral Distance for Intrusion Detection
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs and executing on different platforms—behave si...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
JSAC
2007
97views more  JSAC 2007»
13 years 9 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
14 years 4 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema