Sciweavers

29 search results - page 4 / 6
» Intrusive and non-intrusive watermarking
Sort
View
ICDCSW
2005
IEEE
14 years 3 months ago
Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks
∗ In this paper, we propose a transport control performance improvement algorithm in heterogeneous networks. This paper discusses some novel algorithms to estimate the available...
Fang Qi, Weijia Jia, Jie Wu
COOPIS
2004
IEEE
14 years 1 months ago
Refresco: Improving Query Performance Through Freshness Control in a Database Cluster
Abstract. We consider the use of a cluster system for managing autonomous databases. In order to improve the performance of read-only queries, we strive to exploit user requirement...
Cécile Le Pape, Stéphane Ganç...
IJNSEC
2010
141views more  IJNSEC 2010»
13 years 4 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
CCS
2007
ACM
14 years 4 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
ESCIENCE
2005
IEEE
14 years 3 months ago
Transparent Resource Allocation to Exploit Idle Cluster Nodes in Computational Grids
Clusters of workstations are one of the most suitable resources to assist e-scientists in the execution of largescale experiments that demand processing power. The utilization rat...
Marco Aurélio Stelmar Netto, Rodrigo N. Cal...