Sciweavers

1134 search results - page 176 / 227
» On Scalability and Modularisation in the Modelling of Networ...
Sort
View
ICALP
1999
Springer
13 years 12 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli
POLICY
2007
Springer
14 years 1 months ago
Adaptive Web Data Extraction Policies
Web data extraction is concerned, among other things, with routine data accessing and downloading from continuously-updated dynamic Web pages. There is a relevant trade-off between...
Giacomo Fiumara, Massimo Marchi, Alessandro Provet...
COMCOM
2010
150views more  COMCOM 2010»
13 years 7 months ago
Convergence of trajectories and optimal buffer sizing for MIMD congestion control
We study the interaction between the MIMD (Multiplicative Increase Multiplicative Decrease) congestion control and a bottleneck router with Drop Tail buffer. We consider the probl...
Yi Zhang, Alexei B. Piunovskiy, Urtzi Ayesta, Kons...
CW
2003
IEEE
14 years 28 days ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
CCS
2001
ACM
14 years 4 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé