Sciweavers

7544 search results - page 1446 / 1509
» Network Forensics Analysis
Sort
View
125
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 2 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
156
Voted
MST
2006
136views more  MST 2006»
15 years 2 months ago
Simple Efficient Load-Balancing Algorithms for Peer-to-Peer Systems
Load balancing is a critical issue for the efficient operation of peerto-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a...
David R. Karger, Matthias Ruhl
136
Voted
PERCOM
2006
ACM
15 years 2 months ago
Incorporating Wireless Technology into Virtual Organizations Supporting the Work of Healthcare Teams
This study investigates how a virtual organization can be built in a distributed computing environment which includes wireless technology to support the work of a multi-disciplina...
Mohyuddin, W. A. Gray, David Morrey, Wendy Jones
125
Voted
BMCBI
2005
116views more  BMCBI 2005»
15 years 2 months ago
Dynamic covariation between gene expression and proteome characteristics
Background: Cells react to changing intra- and extracellular signals by dynamically modulating complex biochemical networks. Cellular responses to extracellular signals lead to ch...
Mansour Taghavi Azar Sharabiani, Markku Siermala, ...
127
Voted
TON
2008
138views more  TON 2008»
15 years 2 months ago
On the performance benefits of multihoming route control
Multihoming is increasingly being employed by large enterprises and data centers to extract good performance and reliability from their ISP connections. Multihomed end networks tod...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
« Prev « First page 1446 / 1509 Last » Next »