Sciweavers

1266 search results - page 78 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
FORTE
2000
15 years 5 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...
APLAS
2000
ACM
15 years 8 months ago
An Open Environment for Cooperative Equational Solving
We describe a system called CFLP which aims at the integration of the best features of functional logic programming (FLP), cooperative constraint solving (CCS), and distributed co...
Tetsuo Ida, Mircea Marin
INFOCOM
2009
IEEE
15 years 11 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
15 years 9 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
BROADNETS
2006
IEEE
15 years 10 months ago
Sensor Localization and Camera Calibration in Distributed Camera Sensor Networks
— Camera sensors constitute an information rich sensing modality with many potential applications in sensor networks. Their effectiveness in a sensor network setting however grea...
Andrew Barton-Sweeney, Dimitrios Lymberopoulos, An...