Sciweavers

538 search results - page 78 / 108
» On Distributed Rating Systems for Peer-to-Peer Networks
Sort
View
HOTI
2005
IEEE
14 years 2 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
IADIS
2004
13 years 10 months ago
Speculative TCP Connection Admission Using Connection Migration in Cluster-Based Servers
This paper presents speculative TCP connection admission, a mechanism for improving sub-optimal request distribution decisions in cluster-based servers. Overloaded server nodes in...
Vlad Olaru, Walter F. Tichy
IOR
2008
113views more  IOR 2008»
13 years 8 months ago
Service Competition with General Queueing Facilities
In many service industries, companies compete with each other on the basis of the waiting time their customers experience, along with the price they charge for their service. A fi...
Gad Allon, Awi Federgruen
EGPGV
2004
Springer
175views Visualization» more  EGPGV 2004»
14 years 2 months ago
Interactive Parallel Visualization of Large Particle Datasets
This paper presents a new interactive parallel method for direct visualization of large particle datasets. Based on a parallel rendering cluster, a frame rate of 9 frames-per-seco...
Kevin Liang, Patricia Monger, Huge Couchman
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 3 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...