Sciweavers

6025 search results - page 1041 / 1205
» Flexibility in Service Processes
Sort
View
AINA
2009
IEEE
15 years 11 months ago
SOA Initiatives for eLearning: A Moodle Case
— Mobile learning applications introduce a new degree of ubiquitousness in the learning process. There is a new generation of ICT-powered mobile learning experiences that exist i...
María José Casany Guerrero, Marc Ali...
ISPASS
2009
IEEE
15 years 11 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
EUROSYS
2009
ACM
15 years 11 months ago
SnowFlock: rapid virtual machine cloning for cloud computing
Virtual Machine (VM) fork is a new cloud computing abstraction that instantaneously clones a VM into multiple replicas running on different hosts. All replicas share the same init...
Horacio Andrés Lagar-Cavilla, Joseph Andrew...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 10 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 10 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
« Prev « First page 1041 / 1205 Last » Next »