Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJanuary 2006
Description of bad-signatures for network intrusion detection
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54Pages 175–182Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems normally use stochastic approaches or a rule-based system to detect ...
- ArticleJanuary 2006
A template based static coalition protocol: a3P viGrid
Problems such as resource and service discovery models, load balancing and scheduling, brokering are eminent in grid systems due to bottlenecks such as bandwidth and network traffic in the underlying communication infrastructures and their associated ...
- ArticleJanuary 2006
An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing
The conventional computing Grid has developed a service oriented computing architecture with a super-localresource management and scheduling strategy. This architecture is limited in modeling computer systems with highly dynamic and autonomous computing ...
- ArticleJanuary 2006
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisation of large scale gridsystems requires the provision of mechanisms to share ...