Sciweavers

381 search results - page 55 / 77
» host 2008
Sort
View
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
14 years 2 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
NDSS
2008
IEEE
14 years 2 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
NOMS
2008
IEEE
14 years 2 months ago
Towards SLA-based optimal workload distribution in SANs
—Storage Area Networks (SANs) connect storage devices to servers over fast network interconnects. We consider the problem of optimal SAN configuration with the goal of meeting s...
Eray Gencay, Carsten Sinz, Wolfgang Küchlin
SEAA
2008
IEEE
14 years 2 months ago
Service Coroner: A Diagnostic Tool for Locating OSGi Stale References
The OSGi Services Platform provides a framework for the dynamic deployment of Java-based applications. It allows to install, to activate, to update and to uninstall application mo...
Kiev Gama, Didier Donsez
SECON
2008
IEEE
14 years 2 months ago
Content Distribution in VANETs Using Network Coding: The Effect of Disk I/O and Processing O/H
Abstract—Besides safe navigation (e.g., warning of approaching vehicles), car to car communications will enable a host of new applications, ranging from office-on-the-wheel supp...
Seung-Hoon Lee, Uichin Lee, Kang-Won Lee, Mario Ge...