Sciweavers

39 search results - page 5 / 8
» Distributed chasing of network intruders
Sort
View
HPDC
2000
IEEE
13 years 10 months ago
Failure-Atomic File Access in an Interposed Network Storage System
This paper presents a recovery protocol for block I/O operations in Slice, a storage system architecture for highspeed LANs incorporating network-attached block storage. The goal ...
Darrell C. Anderson, Jeffrey S. Chase
HPDC
1997
IEEE
13 years 10 months ago
Cut-Through Delivery in Trapeze: An Exercise in Low-Latency Messaging
New network technology continues to improve both the latency and bandwidth of communication in computer clusters. The fastest high-speed networks approach or exceed the I/O bus ba...
Ken Yocum, Jeffrey S. Chase, Andrew J. Gallatin, A...
HPDC
2005
IEEE
13 years 11 months ago
Lerna: an active storage framework for flexible data access and management
In the present paper, we examine the problem of supporting application-specific computation within a network file server. Our objectives are (i) to introduce an easy to use yet ...
Stergios V. Anastasiadis, Rajiv Wickremesinghe, Je...
COMCOM
2006
194views more  COMCOM 2006»
13 years 6 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
PDP
2009
IEEE
14 years 24 days ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...