Sciweavers

1266 search results - page 28 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 8 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
ICNS
2006
IEEE
14 years 2 months ago
Evaluating Global Optimisation for Data Grids using Replica Location Services
As efforts to develop grid computing solutions gather pace, considerable attention has been directed at defining and addressing technical requirements associated with computationa...
Ernest Sithole, Gerard P. Parr, Sally I. McClean, ...
CIS
2008
Springer
13 years 10 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
IADIS
2003
13 years 9 months ago
Anti-Sniffing in Unbounded Networks
Along with the trend in networked computing environments towards largely unbounded network infrastructures, the traditional anti-sniffing issue meets a great challenge. This paper...
Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding
HPDC
1999
IEEE
14 years 22 days ago
Overview of a Performance Evaluation System for Global Computing Scheduling Algorithms
While there have been several proposals of high performance global computing systems, scheduling schemes for the systems have not been well investigated. The reason is difficultie...
Atsuko Takefusa, Satoshi Matsuoka, Hidemoto Nakada...