Sciweavers

1266 search results - page 145 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 9 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri
DBA
2004
77views Database» more  DBA 2004»
15 years 5 months ago
Towards the Architecture of P2P-based Information Retrieval
In the conventional Peer-to-Peer (P2P) networks, many research projects or practical applications still use the keyword-based retrieval methods in the information searching compon...
Hao Ding, Peep Küngas, Yun Lin
CSE
2009
IEEE
15 years 7 months ago
Energy Consumption of Residential and Professional Switches
Abstract—Precise evaluation of network appliance energy consumption is necessary to accurately model or simulate the power consumption of distributed systems. In this paper we ev...
Helmut Hlavacs, Georges Da Costa, Jean-Marc Pierso...
SAC
2010
ACM
15 years 11 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
ICIW
2009
IEEE
15 years 11 months ago
Paircoding: Improving File Sharing Using Sparse Network Codes
BitTorrent and Practical Network Coding are efficient methods for sharing files in a peer-to-peer network. Both face the problem to distribute a given file using peers with dif...
Christian Ortolf, Christian Schindelhauer, Arne Va...