Sciweavers

1318 search results - page 251 / 264
» Measuring network security using dynamic bayesian network
Sort
View
IPPS
2000
IEEE
14 years 1 days ago
Switch Scheduling in the Multimedia Router (MMR)
The primary goal of the Multimedia Router (MMR) project is the design and implementation of a router optimized for multimedia applications. The router is targeted for use in clust...
Damon S. Love, Sudhakar Yalamanchili, José ...
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
SIGCOMM
1994
ACM
13 years 11 months ago
An Architecture for Wide-Area Multicast Routing
Existing multicast routing mechanisms were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. When group members, and sende...
Stephen E. Deering, Deborah Estrin, Dino Farinacci...
PERCOM
2007
ACM
14 years 7 months ago
Achieving Flexible Cache Consistency for Pervasive Internet Access
Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing e...
Yu Huang 0002, Jiannong Cao, Zhijun Wang, Beihong ...
SC
2003
ACM
14 years 27 days ago
A Self-Organizing Flock of Condors
Condor provides high throughput computing by leveraging idlecycles on off-the-shelf desktop machines. It also supports flocking, a mechanism for sharing resources among Condor po...
Ali Raza Butt, Rongmei Zhang, Y. Charlie Hu