Sciweavers

NDSS
2007
IEEE
14 years 5 months ago
A Quantitative Study of Forum Spamming Using Context-based Analysis
Yuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming...
NDSS
2007
IEEE
14 years 5 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
NAS
2007
IEEE
14 years 5 months ago
An Efficient SAN-Level Caching Method Based on Chunk-Aging
: SAN-level caching can manage caching within a global view so that global hot data can be identified and cached. However, two problems may be encountered in the existing SAN-level...
Jiwu Shu, Yang Wang 0009, Wei Xue, Yifeng Luo
NAS
2007
IEEE
14 years 5 months ago
An Object-based Storage Controller Based on Switch Fabric
Object-based Storage Controller (OSC) plays a decisive role in the performance of the whole Object-based Storage Systems (OBSS). A new OSC based on switch fabric proposed in this ...
Shuibing He, Dan Feng
NAS
2007
IEEE
14 years 5 months ago
Performance Evaluation of A Load Self-Balancing Method for Heterogeneous Metadata Server Cluster Using Trace-Driven and Syntheti
In cluster-based storage systems, the metadata server cluster must be able to adaptively distribute responsibility for metadata to maintain high system performance and long-term l...
Bin Cai, Changsheng Xie, Guangxi Zhu
ICON
2007
IEEE
14 years 5 months ago
Flexible Throughput Management in IEEE 802.11e Wireless LANs
—The IEEE 802.11e standard has been developed to provide quality of service (QoS) support to a wireless local area network (WLAN). The framework for the standard is defined such...
Shafiqul Karim, David Green, Michael Peter Rumsewi...
ICON
2007
IEEE
14 years 5 months ago
The Capacity of MIMO-based Wireless Mesh Networks
—Data transmission in wireless mesh networks (WMNs) has a multi-hop nature where data is originated/destinated to one source/sink node. Therefore, the transmission capacity at th...
Wael Jaafar, Wessam Ajib, Sami Tabbane
ICON
2007
IEEE
14 years 5 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...