Sciweavers

2904 search results - page 526 / 581
» Internet Infrastructure Security
Sort
View
SIGECOM
2006
ACM
385views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
B2C e-commerce development in Africa: case study of Botswana
The global wave of ICT development has become a strong driving force in almost every aspect of human endeavor. Electronic commerce (e-commerce) is fast gaining a prominent place i...
Faith-Michael E. Uzoka, Geoffrey G. Seleka
CCGRID
2005
IEEE
14 years 2 months ago
Evaluating high-throughput reliable multicast for grid applications in production networks
Grid computing can be characterized as a distributed infrastructure that is a collection of computing resources within or across locations that are aggregated to act as a unified ...
Marinho P. Barcellos, Maziar Nekovee, M. Koyabe, M...
MSS
2005
IEEE
182views Hardware» more  MSS 2005»
14 years 2 months ago
Evaluation of Advanced TCP Stacks in the iSCSI Environment using Simulation Model
Enterprise storage demands have overwhelmed traditional storage mechanisms and have led to the development of Storage Area Networks (SANs). This has resulted in the design of SCSI...
Girish Motwani, K. Gopinath
P2P
2005
IEEE
189views Communications» more  P2P 2005»
14 years 2 months ago
Proximity Neighbor Selection for a DHT in Wireless Multi-Hop Networks
A mobile ad hoc network (MANET) is a multi-hop wireless network having no infrastructure. Thus, the mobile nodes have to perform basic control tasks, such as routing, and higher-l...
Curt Cramer, Thomas Fuhrmann
QEST
2005
IEEE
14 years 2 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel