找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: On the Move to Meaningful Internet Systems: OTM 2010; Confederated Interna Robert Meersman,Tharam Dillon,Pilar Herrero Conference proceedin

[复制链接]
楼主: STRI
发表于 2025-3-25 04:27:20 | 显示全部楼层
Scalable Transactions in the Cloud: Partitioning Revisitedt of huge amounts of data, which cannot be solved with traditional nor replicated database systems as we know them. Recent solutions store data in special key-value structures, in an approach that commonly lacks the consistency provided by transactional guarantees, as it is traded for high scalabili
发表于 2025-3-25 08:31:48 | 显示全部楼层
Fadip: Lightweight Publish/Subscribe for Mobile Ad Hoc Networkses the ability to communicate in an asynchronous way. Publish/Subscribe systems have been extensively studied for wired networks but designing a Publish/Subscribe system for mobile ad hoc networks is still a challenge. In this paper we propose a lightweight Publish/ Subscribe system for mobile ad ho
发表于 2025-3-25 12:15:55 | 显示全部楼层
Analysis of the Performance-Influencing Factors of Virtualization Platformsfficient, they promise energy and cost savings. Additionally, virtualization is the key enabling technology for Cloud Computing and server consolidation. However, the effects of sharing resources on system performance are not yet well-understood. This makes performance prediction and performance man
发表于 2025-3-25 18:47:41 | 显示全部楼层
发表于 2025-3-25 21:31:54 | 显示全部楼层
发表于 2025-3-26 01:32:40 | 显示全部楼层
A Distributed and Privacy-Preserving Method for Network Intrusion Detectiond across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process that takes the events produced by the monitoring compo
发表于 2025-3-26 05:03:00 | 显示全部楼层
Enforcing UCON Policies on the Enterprise Service Buslicies is to constrain the usage of groups of resources based on complex conditions that require not only state-keeping but also automatic reaction to state changes. We argue that these policies instantiate usage control requirements that can be enforced at the infrastructure layer. Extending a poli
发表于 2025-3-26 12:04:34 | 显示全部楼层
Detecting Sybil Nodes in Static and Dynamic Networksities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with
发表于 2025-3-26 14:26:07 | 显示全部楼层
发表于 2025-3-26 19:17:10 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-7 03:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表