找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: On the Move to Meaningful Internet Systems: OTM 2010; Confederated Interna Robert Meersman,Tharam Dillon,Pilar Herrero Conference proceedin

[復(fù)制鏈接]
樓主: STRI
21#
發(fā)表于 2025-3-25 04:27:20 | 只看該作者
Scalable Transactions in the Cloud: Partitioning Revisitedt of huge amounts of data, which cannot be solved with traditional nor replicated database systems as we know them. Recent solutions store data in special key-value structures, in an approach that commonly lacks the consistency provided by transactional guarantees, as it is traded for high scalabili
22#
發(fā)表于 2025-3-25 08:31:48 | 只看該作者
Fadip: Lightweight Publish/Subscribe for Mobile Ad Hoc Networkses the ability to communicate in an asynchronous way. Publish/Subscribe systems have been extensively studied for wired networks but designing a Publish/Subscribe system for mobile ad hoc networks is still a challenge. In this paper we propose a lightweight Publish/ Subscribe system for mobile ad ho
23#
發(fā)表于 2025-3-25 12:15:55 | 只看該作者
Analysis of the Performance-Influencing Factors of Virtualization Platformsfficient, they promise energy and cost savings. Additionally, virtualization is the key enabling technology for Cloud Computing and server consolidation. However, the effects of sharing resources on system performance are not yet well-understood. This makes performance prediction and performance man
24#
發(fā)表于 2025-3-25 18:47:41 | 只看該作者
25#
發(fā)表于 2025-3-25 21:31:54 | 只看該作者
26#
發(fā)表于 2025-3-26 01:32:40 | 只看該作者
A Distributed and Privacy-Preserving Method for Network Intrusion Detectiond across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process that takes the events produced by the monitoring compo
27#
發(fā)表于 2025-3-26 05:03:00 | 只看該作者
Enforcing UCON Policies on the Enterprise Service Buslicies is to constrain the usage of groups of resources based on complex conditions that require not only state-keeping but also automatic reaction to state changes. We argue that these policies instantiate usage control requirements that can be enforced at the infrastructure layer. Extending a poli
28#
發(fā)表于 2025-3-26 12:04:34 | 只看該作者
Detecting Sybil Nodes in Static and Dynamic Networksities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with
29#
發(fā)表于 2025-3-26 14:26:07 | 只看該作者
30#
發(fā)表于 2025-3-26 19:17:10 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 17:35
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
丰原市| 麻栗坡县| 来凤县| 沙河市| 康保县| 新民市| 通许县| 惠州市| 桦南县| 北川| 雷州市| 建昌县| 尉犁县| 商城县| 和林格尔县| 安义县| 通州市| 马龙县| 金坛市| 九龙城区| 富顺县| 柳河县| 马鞍山市| 托克逊县| 荥阳市| 广河县| 本溪市| 莱西市| 会宁县| 喀喇| 宜章县| 昭苏县| 阿拉善右旗| 金坛市| 德安县| 仁寿县| 囊谦县| 安多县| 镇沅| 吉水县| 沅陵县|