gridcomputing presents a new trend to distributed computing and Internet applications, which can construct a virtual single image of heterogeneous resources, provide uniform application interface and integrate widesp...
详细信息
The emerging service grids bring together various distributed application-level services to a 'market' for clients to request and enable the integration of services across distributed, heterogeneous, dynamic v...
详细信息
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative trust mechanism. This paper analyses...
详细信息
In this paper, we propose an approach for the real-time performance analysis of distributed software with reliability constraints, called Athena. The approach is based on the principle of distributed program real-time...
详细信息
ISBN:
(纸本)0769521320
In this paper, we propose an approach for the real-time performance analysis of distributed software with reliability constraints, called Athena. The approach is based on the principle of distributed program real-time performance analysis. In Athena, we design some algorithms, count the transmission time for all the transmission paths of each data file, and then calculate response time of each data file with reliability constraint. So the real-time performance of distributed software with reliability-constrained can be evaluated.
In intrusion detection system, signature discovery is an important issue, since the performance of an intrusion detection system heavily depends on the accuracy and abundance of signatures. In most cases, we have to f...
详细信息
ISBN:
(纸本)0780384032
In intrusion detection system, signature discovery is an important issue, since the performance of an intrusion detection system heavily depends on the accuracy and abundance of signatures. In most cases, we have to find these signatures manually. This is a time-consuming and error-prone work. Some researchers apply data mining to the intrusion detection system. However, they are almost for anomal IDS detection. In this paper, we use a causal knowledge based on inference technique to discover useful signature for intrusion, and to raise the detection performance. The paper presents how Hsiao's sequential approach and finite automata are used in the causal knowledge acquisition and to support the causal knowledge reasoning process.
This paper presents a new socket handoff scheme to eliminate the fake 3-way handshaking in almost all previous socket handoff systems. The new scheme does not involve the implementation details of TCP/IP protocol stac...
详细信息
ISBN:
(纸本)0769521320
This paper presents a new socket handoff scheme to eliminate the fake 3-way handshaking in almost all previous socket handoff systems. The new scheme does not involve the implementation details of TCP/IP protocol stack, thus greatly simplify the implementation and improve the portability of socket handoff systems. We also have developed a socket handoff system, called SHAK, as a Linux kernel module to verify the feasibility of the new scheme.
Distributed streaming servers based on clusters with multi-components have several failure points, which will destroy the systems or degrades the quality of services. How to provide reliable streaming services is a ve...
详细信息
With the rapid development of information technology, dramatic changes have been taken place in the fundamental ways that people acquire and disseminate knowledge. Various e-Learning systems have been designed to help...
详细信息
Peer-to-Peer media streaming service has gained tremendous momentum in recent years. However, a number of challenges in Peer-to-Peer media streaming have not been addressed. In this paper, we propose a peer-to-peer su...
详细信息
In this paper, we present a detail study about the immunization of viruses in Peer-to-Peer networks exhibiting power-law degree distributions. By comparing two different immunization strategies (randomized and degree-...
详细信息
暂无评论