Results 281 to 290 of about 1,516,815 (340)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Mathematics and Computers in Simulation, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jeganathan, K. +3 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jeganathan, K. +3 more
openaire +2 more sources
Detecting Malicious Server Based on Server-to-Server Realation Graph
2016 IEEE First International Conference on Data Science in Cyberspace (DSC), 2016The rapid development of Internet attack has posed severe threats to information security. Therefore, it's of great interest to both the Internet security companies and researchers to develop novel methods which are capable of protecting users against new threats. However, the sources of these network attack varies.
Zihao Wang +6 more
openaire +1 more source
Proceedings of the 2010 ACM Symposium on Applied Computing, 2010
The Sporadic Server (SS) overcomes the major limitations of other Resource Reservation Fixed Priority based techniques, but it also presents some drawbacks, mainly related to an increased scheduling overhead and a not so efficient behavior during overrun situations.In this paper we introduce and prove the effectiveness of an improved SS with reduced ...
D. FAGGIOLI +2 more
openaire +4 more sources
The Sporadic Server (SS) overcomes the major limitations of other Resource Reservation Fixed Priority based techniques, but it also presents some drawbacks, mainly related to an increased scheduling overhead and a not so efficient behavior during overrun situations.In this paper we introduce and prove the effectiveness of an improved SS with reduced ...
D. FAGGIOLI +2 more
openaire +4 more sources
Server-Based Dynamic Server Selection Algorithms
2002Server selection is an important problem in replicated server systems distributed over the Internet. In this paper, we study two server selection algorithms under a server-based framework we have developed. These algorithms utilize server load and network performance information collected through a shared passive measurement mechanism to determine the ...
Yingfei Dong +2 more
openaire +1 more source

