The vast majority of sky survey image content is due to well understood phenomena, and only 0.001% of data is of interest for astronomers to study. Computer network intrusion detection exhibits vast amounts of normal user traffic, and a very few examples of malicious attacks. In computer vision based security surveillance of public spaces, observed […]
Policy management is protect sensitive information
THE method of policy based management is widely used to manage complex and large scale network systems. The traditional framework of policy based management consists of four core components: PDP (Policy Decision Point), PEP (Policy Enforcement Point), PAP (Policy Administration Point) and PR (Policy Repository). A well-trained policy administrator or group will specify, verify policies […]
QoS- Chord4S achieves higher data availability Web based services
SERVICE-ORIENTED Computing (SOC) is emerging as a new aradigm for developing distributed applications. Service discovery, among the most fundamental elements of SOC, is critical to the success of SOC as a whole. Traditional service discovery approaches of the web services technology. Centralized service registries used by UDDI may easily suffer from problems such as performance […]
CF-based web service recommender systems and QoS space visualization
Web services are software components designed to support interoperable machine-to-machine interaction over a network. The adoption of web services as a delivery mode in business has fostered a new paradigm shift from the development of monolithic applications to the dynamic setup of business process. The number of public web services is steadily increasing. Implementing service-oriented […]
A Dynamic Load balancing distributed algorithm for a strategy in a real CDN Environment
A Content Delivery Network (CDN) represents a popular and useful solution to effectively support emerging Web applications by adopting a distributed overlay of servers. A CDN consists of an original server (called back-end server) containing new data to be diffused, together with one or more distribution servers, called surrogate servers. Periodically, the surrogate servers are […]
PAIRSE-Privacy Model for Web service Composition
A popular medium for data publishing and sharing on the Web. Modern enterprises across all spectra are moving towards a service-oriented architecture by putting their databases behind Web services, thereby providing a well-documented, platform independent and interoperable method of interacting with their data. This new type of services is known as DaaS (Data-as-a-Service) services where […]
Network Traffic Characterization Using Triangle area-based Multivariate Correlation Analysis
DENIAL-OF-SERVICE (DoS) attacks are one type of aggressive and menacing intrusive behavior to online servers. DoS attacks severely degrade the availability of a victim a host, a router, or an entire network. They impose intensive computation tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The […]
A Online Social network in Peer-to-peer assisted Video on Demand Network
Social networks (OSNs) (e.g., Facebook, Twitter) are now among the most popular sites on the Web. An OSN provides a powerful means of establishing social connections and sharing, organizing, and finding content. OSNs are organized around users. OSN users establish friendship relations with real world friends or virtual friends, and post their profiles and content […]
MULTICAST CAPACITY IN UNIFORMLY DENSE NETWORKS BY AD HOC ROUTING
A rapid development in wireless ad hoc networks, in both academic and industrial fields. The optimal scheduling, routing and relaying of packets, the per-node capacity still decreases as Θ(1/√ n) when n approaches the infinity. Many studies try to improve this disappointing scalability of throughput capacity by introducing different characteristics into ad hoc networks, such […]
SSO scheme Analysis for Authentication of distributed computer Networks
The widespread use of distributed computer networks, it has become common to allow users to access various network services offered by distributed service providers. A crucial role in distributed computer networks to verify if a user is legal and can therefore be granted access to the services requested. To avoid bogus servers, users usually need […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 12
- Next Page »