Sciweavers

7629 search results - page 1332 / 1526
» On the Performance of a Survivability Architecture for Netwo...
Sort
View
NETGAMES
2005
ACM
14 years 1 months ago
Dissecting server-discovery traffic patterns generated by multiplayer first person shooter games
We study the ‘background traffic’ resulting from tens of thousands of networked first person shooter (FPS) clients searching for servers on which to play. Networked, multiplay...
Sebastian Zander, David Kennedy, Grenville J. Armi...
DEBS
2008
ACM
13 years 9 months ago
An adaptive approach for ensuring reliability in event based middleware
In this effort we tackle the important issue of providing Quality of Service (QoS) guarantees to subscribers, when routing event notifications in a publish-subscribe domain. In ...
Shruti P. Mahambre, Umesh Bellur
CCS
2010
ACM
13 years 8 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
IPPS
2007
IEEE
14 years 2 months ago
Scalable Distributed Execution Environment for Large Data Visualization
To use heterogeneous and geographically distributed resources as a platform for parallel visualization is an intriguing topic of research. This is because of the immense potential...
Micah Beck, Huadong Liu, Jian Huang, Terry Moore
« Prev « First page 1332 / 1526 Last » Next »