Sciweavers

219 search results - page 24 / 44
» Highly efficient techniques for network forensics
Sort
View
EUC
2007
Springer
13 years 11 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Dynamic Server Redirect for Multimedia Service in Distributed Peer-to-Peer Network
Peer-to-Peer (P2P) multimedia application is expected to be one of the most important services supported by the next generation networks. However, how to balance server load in re...
Ming-Ho Hsiao, Suh-Yin Lee
ICDE
2008
IEEE
108views Database» more  ICDE 2008»
14 years 8 months ago
Self-Join Size Estimation in Large-scale Distributed Data Systems
In this work we tackle the open problem of self-join size (SJS) estimation in a large-scale Distributed Data System, where tuples of a relation are distributed over data nodes whic...
Theoni Pitoura, Peter Triantafillou
OSDI
2002
ACM
14 years 7 months ago
Integrated Resource Management for Cluster-based Internet Services
Client request rates for Internet services tend to be bursty and thus it is important to maintain efficient resource utilization under a wide range of load conditions. Network ser...
Kai Shen, Hong Tang, Tao Yang, Lingkun Chu
PERCOM
2008
ACM
14 years 7 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...