Sciweavers

1266 search results - page 61 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
139
Voted
ICAC
2006
IEEE
15 years 10 months ago
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure
A shared distributed infrastructure is formed by federating computation resources from multiple domains. Such shared infrastructures are increasing in popularity and are providing...
Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell...
DISCEX
2003
IEEE
15 years 9 months ago
Surveillance Detection in High Bandwidth Environments
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique ...
Seth Robertson, Eric V. Siegel, Matthew Miller, Sa...
155
Voted
BMCBI
2005
134views more  BMCBI 2005»
15 years 4 months ago
Windows .NET Network Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST)
Background: BLAST is one of the most common and useful tools for Genetic Research. This paper describes a software application we have termed Windows .NET Distributed Basic Local ...
Scot E. Dowd, Joaquin Zaragoza, Javier R. Rodrigue...
CASCON
1996
160views Education» more  CASCON 1996»
15 years 5 months ago
Automatic generation of performance models for distributed application systems
Organizations have become increasingly dependent on computing systems to achieve their business goals. The performance of these systems in terms of response times and cost has a m...
M. Qin, R. Lee, Asham El Rayess, Vidar Vetland, Je...
JUCS
2008
177views more  JUCS 2008»
15 years 4 months ago
An Improved Multi-Agent Simulation Methodology for Modelling and Evaluating Wireless Communication Systems Resource Allocation A
: Multi-Agent Systems (MAS) constitute a well known approach in modelling dynamical real world systems. Recently, this technology has been applied to Wireless Communication Systems...
P. M. Papazoglou, Dimitris A. Karras, Rallis C. Pa...