Sciweavers

14248 search results - page 2680 / 2850
» Queries
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 5 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ICPADS
2007
IEEE
14 years 5 months ago
A scheduling algorithm for revenue maximisation for cluster-based Internet services
This paper proposes a new priority scheduling algorithm to maximise site revenue of session-based multi-tier Internet services in a multicluster environment. This research is part...
James Wen Jun Xue, Ligang He, Stephen A. Jarvis
INFOCOM
2007
IEEE
14 years 5 months ago
Availability in BitTorrent Systems
— In this paper, we investigate the problem of highly available, massive-scale file distribution in the Internet. To this end, we conduct a large-scale measurement study of BitT...
Giovanni Neglia, Giuseppe Reina, Honggang Zhang, D...
INFOCOM
2007
IEEE
14 years 5 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
IV
2007
IEEE
144views Visualization» more  IV 2007»
14 years 5 months ago
Visualizing Evolving Searches with EvoBerry
Studies show that roughly one-third of searches that are performed on the web require the user to initiate subsequent searches. Bates [1] theorized that with every search the user...
Edward Suvanaphen, Jonathan C. Roberts
« Prev « First page 2680 / 2850 Last » Next »