Sciweavers

459 search results - page 56 / 92
» Malware Models for Network and Service Management
Sort
View
MOBISYS
2008
ACM
16 years 3 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
CN
2007
137views more  CN 2007»
15 years 4 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
ESCIENCE
2006
IEEE
15 years 7 months ago
Economy-Based Data Replication Broker
Data replication is one of the key components in data grid architecture as it enhances data access and reliability and minimises the cost of data transmission. In this paper, we a...
Henry Lin, Jemal H. Abawajy, Rajkumar Buyya
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
15 years 6 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis
WWIC
2004
Springer
197views Communications» more  WWIC 2004»
15 years 9 months ago
Context-Aware Group Communication in Mobile Ad-Hoc Networks
Abstract. The widespread availability of both fixed and wireless network connectivity and the growing market of portable devices are enabling anytime and anywhere impromptu collabo...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari