Sciweavers

1266 search results - page 50 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
133
Voted
MSS
2000
IEEE
106views Hardware» more  MSS 2000»
15 years 8 months ago
Disk Subsystem Performance Evaluation: From Disk Drives to Storage Area Networks
Disk subsystems span the range of configuration complexity from single disk drives to large installations of disk arrays. They can be directly attached to individual computer syst...
Thomas Ruwart
142
Voted
CSE
2009
IEEE
15 years 10 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
HPCC
2005
Springer
15 years 9 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
ICC
2009
IEEE
179views Communications» more  ICC 2009»
15 years 10 months ago
Distributed Power Control for Interference-Limited Cooperative Relay Networks
— In this paper, a distributed power control algorithm is proposed for wireless relay networks in interference-limited environments. The objective is to minimize the total transm...
Sheng Zhou, Hongda Xiao, Zhisheng Niu
152
Voted
RTAS
2006
IEEE
15 years 10 months ago
Scalable Modeling and Performance Evaluation of Wireless Sensor Networks
A notable features of many proposed Wireless Sensor Networks (WSNs) deployments is their scale: hundreds to thousands of nodes linked together. In such systems, modeling the state...
YoungMin Kwon, Gul Agha