Sciweavers

2951 search results - page 543 / 591
» Secure Distributed DNS
Sort
View
JSAC
2006
137views more  JSAC 2006»
15 years 2 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
PERVASIVE
2006
Springer
15 years 2 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
116
Voted
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
15 years 2 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
119
Voted
SIGKDD
2008
149views more  SIGKDD 2008»
15 years 2 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
135
Voted
IJNSEC
2007
157views more  IJNSEC 2007»
15 years 2 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai