Sciweavers

1266 search results - page 19 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PERCOM
2009
ACM
14 years 2 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...
NETWORKING
2004
13 years 8 months ago
An Efficient Probabilistic Packet Marking Scheme for IP Traceback
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...
Basheer Al-Duwairi, Anirban Chakrabarti, Govindara...
PDPTA
2003
13 years 8 months ago
Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing
- Pervasive computing is an emerging technology that brings new dimensions to distributed computing; it uses a wide variety of smart, ubiquitous devices throughout an individual’...
David Levine, Renjith Thomas, Farhad Kamangar, Ger...
GCC
2003
Springer
14 years 17 days ago
Network Storage Management in Data Grid Environment
This paper presents the Network Storage Manager (NSM) developed in the Distributed Computing Laboratory at Jackson State University. NSM is designed as a Java-based, high-performan...
Shaofeng Yang, Zeyad Ali, Houssain Kettani, Vinti ...
FAST
2008
13 years 9 months ago
TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions
TierStore is a distributed filesystem that simplifies the development and deployment of applications in challenged network environments, such as those in developing regions. For e...
Michael J. Demmer, Bowei Du, Eric A. Brewer