Sciweavers

5324 search results - page 942 / 1065
» Internet Security Protocols
Sort
View
ESWS
2004
Springer
14 years 1 months ago
Publish/Subscribe for RDF-based P2P Networks
Publish/subscribe systems are an alternative to query based systems in cases where the same information is asked for over and over, and where clients want to get updated answers fo...
Paul-Alexandru Chirita, Stratos Idreos, Manolis Ko...
ICCS
2004
Springer
14 years 1 months ago
Active and Logistical Networking for Grid Computing: The E-toile Architecture
While active networks provide new solutions for the deployment of dynamic services in the network, exposing network processing resources, logistical networking focuses on exposing...
Alessandro Bassi, Micah Beck, Fabien Chanussot, Je...
ICWE
2004
Springer
14 years 1 months ago
SIE - Intelligent Web Proxy Framework
In this paper we would like to present and describe SIE, a transparent, intelligent Web proxy framework. Its aim is to provide efficient and robust platform for implementing vari...
Grzegorz Andruszkiewicz, Krzysztof Ciebiera, Marci...
ICNP
2003
IEEE
14 years 1 months ago
Optimal Resource Allocation in Overlay Multicast
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
Yi Cui, Yuan Xue, Klara Nahrstedt
INFOCOM
2003
IEEE
14 years 1 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley