Sciweavers

5269 search results - page 910 / 1054
» Operating system resource management
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 8 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
NETWORK
2007
100views more  NETWORK 2007»
13 years 8 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
14 years 3 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
SEMWEB
2007
Springer
14 years 3 months ago
Extreme Tagging: Emergent Semantics through the Tagging of Tags
While the Semantic Web requires a large amount of structured knowledge (triples) to allow machine reasoning, the acquisition of this knowledge still represents an open issue. Indee...
Vlad Tanasescu, Olga Streibel
CONEXT
2006
ACM
14 years 2 months ago
Towards a versatile transport protocol
In the context of a reconfigurable transport protocol, this paper introduces two protocol instances based on the composition and specialisation of the TFRC congestion control and...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...