Recent advances in mobile and wireless technologies make possible the bear of new services and the extension of traditional ones in new scenarios. Adaptation strategies play a cru...
Domenico Cotroneo, Generoso Paolillo, C. Pirro, St...
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...
Current high-performance computer systems are unable to saturate the latest available high-bandwidth networks such as 10 Gigabit Ethernet. A key obstacle in achieving 10 gigabits ...
Nathan L. Binkert, Lisa R. Hsu, Ali G. Saidi, Rona...
The In-VIGO approach to Grid-computing relies on the dynamic establishment of virtual grids on which application services are instantiated. InVIGO was conceived to enable computati...