Existing replica services on the Grid we know to date assumes point-to-point communication and file transfer protocol. As such, when hundreds to thousands of hosts on the Grid ac...
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Using the application of bulk data transfer, we investigate end-to-end failover mechanisms and thresholds for transport protocols that support multihoming (e.g., SCTP). First, we e...
Armando L. Caro Jr., Paul D. Amer, Randall R. Stew...
Abstract. There is considerable interest in techniques capable of identifying anomalies and unusual events in busy outdoor scenes, e.g. road junctions. Many approaches achieve this...