Sciweavers

537 search results - page 3 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
DSN
2007
IEEE
13 years 9 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
CN
2006
87views more  CN 2006»
13 years 5 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
AIMS
2009
Springer
13 years 10 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
ISM
2005
IEEE
153views Multimedia» more  ISM 2005»
13 years 11 months ago
Application Layer Error Correction Scheme for Video Header Protection on Wireless Network
In wireless video streaming application, video information may be corrupted by a noisy channel. By introducing error resilience and error concealment techniques, many researchers ...
Chia-Ho Pan, I-Hsien Lee, Sheng-Chieh Huang, Chih-...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
13 years 9 months ago
Comparison of Protection Mechanisms: Capacity Efficiency and Recovery Time
High efficiency in capacity utilization and fast restoration are two primary goals of survivable design in optical networks. Shared backup path protection has been shown to be effi...
Wensheng He, Arun K. Somani