Sciweavers

1266 search results - page 54 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IEEESCC
2010
IEEE
15 years 8 months ago
Dynamic Composition of Services in Sensor Networks
Abstract—Service modeling and composition is a fundamental method for offering advanced functionality by combining a set of primitive services provided by the system. Unlike in t...
Sahin Cem Geyik, Boleslaw K. Szymanski, Petros Zer...
DSN
2005
IEEE
15 years 9 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
ICPADS
2002
IEEE
15 years 9 months ago
Experiences in Building a Scalable Distributed Network Emulation System
Network emulation systems are widely used to explore the behavior of network protocols and to test and evaluate protocol implementations and applications. The major problem of net...
Pei Zheng, Lionel M. Ni
ICDCSW
2006
IEEE
15 years 10 months ago
Evaluation of Unstructured Overlay Maintenance Protocols under Churn
An overlay network is formed on top of – and generally independently from – the underlying physical computer network, by the peers (nodes) of a P2P system. The dynamics of pee...
Roberto Baldoni, Silvia Bonomi, Adriano Rippa, Leo...
WOWMOM
2005
ACM
139views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
An Agile Approach to Distributed Information Dissemination in Mobile Ad Hoc Networks
In order to ease the challenging task of information dissemination in a MANET, we employ a legend: a data structure passed around a network to share information with all the mobil...
Nicholas Bauer, Michael Colagrosso, Tracy Camp