Sciweavers

492 search results - page 60 / 99
» Impact of Limited Memory Resources
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
INFOCOM
2008
IEEE
14 years 2 months ago
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking
—Hash tables are extensively used in networking to implement data-structures that associate a set of keys to a set of values, as they provide O(1), query, insert and delete opera...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley
ICCCN
2008
IEEE
14 years 2 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...
ATAL
2003
Springer
14 years 29 days ago
Constructing optimal policies for agents with constrained architectures
Optimal behavior is a very desirable property of autonomous agents and, as such, has received much attention over the years. However, making optimal decisions and executing optima...
Dmitri A. Dolgov, Edmund H. Durfee
DIS
2006
Springer
13 years 9 months ago
Change Detection with Kalman Filter and CUSUM
Knowledge discovery systems are constrained by three main limited resources: time, memory and sample size. Sample size is traditionally the dominant limitation, but in many present...
Milton Severo, João Gama