Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

34 results
Deposit type : Fulltext
publicationDateY_i : 2011
Image document

Securing the Internet: Fact or Fiction?

Basie Von Solms
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.1-8, ⟨10.1007/978-3-642-19228-9_1⟩
Conference papers hal-01581340v1
Image document

Analysis of Web Logs: Challenges and Findings

Maria Carla Calzarossa , Luisa Massari
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.227-239, ⟨10.1007/978-3-642-25575-5_19⟩
Conference papers hal-01586906v1
Image document

The Need for Interoperable Reputation Systems

Sandra Steinbrecher
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.159-169, ⟨10.1007/978-3-642-19228-9_15⟩
Conference papers hal-01581337v1
Image document

Securing the Core University Business Processes

Veliko Ivanov , Monika Tzaneva , Alexandra Murdjeva , Valentin Kisimov
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.104-116, ⟨10.1007/978-3-642-19228-9_9⟩
Conference papers hal-01581344v1
Image document

On traffic domination in communication networks

Walid Ben-Ameur , Pablo Pavón Mariño , Michal Pioro
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienne, Austria. pp.191-202, ⟨10.1007/978-3-642-25575-5_16⟩
Conference papers hal-01301879v1
Image document

Network Protocol Performance Bounding Exploiting Properties of Infinite Dimensional Linear Equations

Ioannis Stavrakakis
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.129-140, ⟨10.1007/978-3-642-25575-5_11⟩
Conference papers hal-01586892v1
Image document

On the Analysis of Queues with Heavy Tails: A Non-Extensive Maximum Entropy Formalism and a Generalisation of the Zipf-Mandelbrot Distribution

Demetres D. Kouvatsos , Salam A. Assi
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.99-111, ⟨10.1007/978-3-642-25575-5_9⟩
Conference papers hal-01586893v1
Image document

Energy: A New Criteria for Performances in Large Scale Distributed Systems

Jean-Marc Pierson
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.38-48, ⟨10.1007/978-3-642-25575-5_4⟩
Conference papers hal-01586899v1
Image document

Disappointments and Delights, Fears and Hopes induced by a few decades in Performance Evaluation

Raymond Marie
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.1-9, ⟨10.1007/978-3-642-25575-5_1⟩
Conference papers hal-00789638v1
Image document

Predicting Disk Scheduling Performance with Virtual Machines

Robert Geist , Zachary H. Jones , James Westall
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.61-72, ⟨10.1007/978-3-642-25575-5_6⟩
Conference papers hal-01586905v1
Image document

Are BGP Routers Open to Attack? An Experiment

Ludovico Cavedon , Christopher Kruegel , Giovanni Vigna
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.88-103, ⟨10.1007/978-3-642-19228-9_8⟩
Conference papers hal-01581336v1
Image document

Tools for Performance Evaluation of Computer Systems: Historical Evolution and Perspectives

Giuliano Casale , Marco Gribaudo , Giuseppe Serazzi
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.24-37, ⟨10.1007/978-3-642-25575-5_3⟩
Conference papers hal-01586901v1
Image document

Model Interoperability for Performance Engineering: Survey of Milestones and Evolution

Connie U. Smith , Catalina M. Lladó
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.10-23, ⟨10.1007/978-3-642-25575-5_2⟩
Conference papers hal-01586894v1
Image document

From the Origins of Performance Evaluation to New Green ICT Performance Engineering

Carlos Juiz , Ramon Puigjaner
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.49-60, ⟨10.1007/978-3-642-25575-5_5⟩
Conference papers hal-01586904v1
Image document

Modelling Social-Aware Forwarding in Opportunistic Networks

Chiara Boldrini , Marco Conti , Andrea Passarella
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.141-152, ⟨10.1007/978-3-642-25575-5_12⟩
Conference papers hal-01586891v1
Image document

A Biometrics-Based Solution to Combat SIM Swap Fraud

Louis Jordaan , Basie Von Solms
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩
Conference papers hal-01581328v1
Image document

Emerging and Future Cyber Threats to Critical Systems

Edita Djambazova , Magnus Almgren , Kiril Dimitrov , Erland Jonsson
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.29-46, ⟨10.1007/978-3-642-19228-9_4⟩
Conference papers hal-01581335v1
Image document

Open Research Questions of Privacy-Enhanced Event Scheduling

Benjamin Kellermann
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.9-19, ⟨10.1007/978-3-642-19228-9_2⟩
Conference papers hal-01581331v1
Image document

Practical Experiences with Purenet, a Self-Learning Malware Prevention System

Alapan Arnab , Tobias Martin , Andrew Hutchison
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.56-69, ⟨10.1007/978-3-642-19228-9_6⟩
Conference papers hal-01581334v1
Image document

Event Handoff Unobservability in WSN

Stefano Ortolani , Mauro Conti , Bruno Crispo , Roberto Di Pietro
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers hal-01581330v1
Image document

Real-Time System for Assessing the Information Security of Computer Networks

Dimitrina Polimirova , Eugene Nickolov
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.123-133, ⟨10.1007/978-3-642-19228-9_11⟩
Conference papers hal-01581341v1
Image document

Security and Privacy Implications of Cloud Computing – Lost in the Cloud

Vassilka Tchifilionova
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.149-158, ⟨10.1007/978-3-642-19228-9_14⟩
Conference papers hal-01581332v1
Image document

Cloud Infrastructure Security

Dimiter Velev , Plamena Zlateva
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.140-148, ⟨10.1007/978-3-642-19228-9_13⟩
Conference papers hal-01581343v1
Image document

A Matrix-Analytic Solution for Randomized Load Balancing Models with PH Service Times

Quan-Lin Li , John Lui , Yang Wang
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.240-253, ⟨10.1007/978-3-642-25575-5_20⟩
Conference papers hal-01586888v1
Image document

On Lookahead Strategy for Movement-Based Location Update: A General Formulation

Vicente Casares-Giner
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.153-166, ⟨10.1007/978-3-642-25575-5_13⟩
Conference papers hal-01586908v1
Image document

Markov Chains and Spectral Clustering

Ning Liu , William J. Stewart
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.87-98, ⟨10.1007/978-3-642-25575-5_8⟩
Conference papers hal-01586907v1
Image document

Bayesian Estimation of Network-Wide Mean Failure Probability in 3G Cellular Networks

Angelo Coluccia , Fabio Ricciato , Peter Romirer-Maierhofer
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.167-178, ⟨10.1007/978-3-642-25575-5_14⟩
Conference papers hal-01586897v1
Image document

Evidential Notions of Defensibility and Admissibility with Property Preservation

Raphael Phan , Ahmad R. Amran , John N. Whitley , David J. Parish
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.134-139, ⟨10.1007/978-3-642-19228-9_12⟩
Conference papers hal-01581333v1
Image document

Modeling Wireless Sensor Networks Using Finite-Source Retrial Queues with Unreliable Orbit

Patrick Wüchner , János Sztrik , Hermann De Meer
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.73-86, ⟨10.1007/978-3-642-25575-5_7⟩
Conference papers hal-01586895v1
Image document

Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users

Anton Palazov
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.117-122, ⟨10.1007/978-3-642-19228-9_10⟩
Conference papers hal-01581339v1