Sciweavers

627 search results - page 57 / 126
» Performance Monitoring of N-tier Client Server Systems
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 1 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
AVSS
2006
IEEE
14 years 3 months ago
Multimedia Surveillance and Monitoring
Most surveillance and monitoring systems nowadays utilize multiple types of sensors. However, due to the asynchrony among and diversity of sensors, information assimilation how to...
Mohan S. Kankanhalli
INFOCOM
2000
IEEE
14 years 1 months ago
On the Placement of Internet Instrumentation
— The IDMaps project aims to provide a distance map of the Internet from which relative distances between hosts on the Internet can be gauged [1]. Many distributed systems and ap...
Sugih Jamin, Cheng Jin, Yixin Jin, Danny Raz, Yuva...
IEEEARES
2009
IEEE
13 years 6 months ago
Reducing the Cost of Session Key Establishment
Scenarios such as online banking, mobile payment systems, stock trading, selling merchandise, and a host of other applications that need a high level of security have moved from th...
Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi S...
WWW
2006
ACM
14 years 9 months ago
Selective early request termination for busy internet services
Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies a load shedding mechanism called...
Jingyu Zhou, Tao Yang