Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Xian-Liang Lu"'
Publikováno v:
Journal of Electronics & Information Technology. 33:1314-1318
Publikováno v:
Journal of Computer Applications. 30:1439-1442
Publikováno v:
Journal of Systems Engineering and Electronics. 17:669-672
Replicas can improve the data reliability in distributed system. However, the traditional algorithms for replica management are based on the assumption that all replicas have the uniform reliability, which is inaccurate in some actual systems. To add
Publikováno v:
ACM SIGOPS Operating Systems Review. 36:7-13
In Network-based Intrusion Detection, signatures discovery is an important issue, since the performance of an intrusion detection system heavily depends on accuracy and abundance of signatures. In most cases, we have to find these signatures manually
Publikováno v:
The 2010 International Conference on Apperceiving Computing and Intelligence Analysis Proceeding.
Orchestra is proposed to change the traditional design process of routing protocols and it firstly introduces the concept of evolution into routing design. The disadvantage of traditional genetic algorithm, such as the bad searching quality and long
Publikováno v:
2007 International Conference on Machine Learning and Cybernetics.
While buffer overflow problem has been known for a long time, it continues to present a serious security threat. Many solutions to the notorious problem were proposed. However, they had their own drawbacks. This paper presents a solution called API i
Publikováno v:
2006 International Conference on Machine Learning and Cybernetics.
For most current intrusion detection systems, the capability to counterstrike network intrusion is limited. And the automatic protection of intranet is extremely difficult. In this paper, we present a system: TAICHI which combines heterogeneous intru
Publikováno v:
Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
More and more attentions have been paid to layered multicast for Internet intrinsic heterogeneity, but little work had been done on "adaptive layering" multicast. We proposed and evaluated a congestion control mechanism for adaptive layered multicast
Publikováno v:
Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
This paper presents a novel distributed cooperative fault-tolerance storage mechanism (DCFS) based on file replication and XOR verification. By using XOR verification files, DCFS makes a group of files, which are distributed among different hosts coo
Publikováno v:
Grid and Cooperative Computing-GCC 2005 ISBN: 9783540305101
GCC
GCC
In P2P systems, every user can release files freely, which makes the large-scale file-sharing feasible. However, with malicious nodes increasing, lots of faked files and deceptive behaviors restrict the development of P2P application. Current P2P tru
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c650cc136728d818046d6b5cf66b6503
https://doi.org/10.1007/11590354_113
https://doi.org/10.1007/11590354_113