Sciweavers

98 search results - page 3 / 20
» Ideal Network Enabled Server Environment
Sort
View
119
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 3 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
113
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
123
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
137
Voted
VTC
2007
IEEE
132views Communications» more  VTC 2007»
15 years 10 months ago
Fault-Tolerant and Load Balancing Localization of Services in Wireless Sensor Networks
— Heterogeneous wireless sensor networks are made up of different kinds of nodes. Some nodes, the sensors, are used as an interface to the physical environment. Other nodes act i...
Francesco Nidito, Michele Battelli, Stefano Basagn...
123
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Network-Centric Buffer Cache Organization
A pass-through server such as an NFS server backed by an iSCSI[1] storage server only passes data between the storage server and NFS clients. Ideally it should require at most one...
Gang Peng, Srikant Sharma, Tzi-cker Chiueh