Sciweavers

21 search results - page 2 / 5
» Intrusion-Tolerant Dissemination in Large-Scale Systems
Sort
View
JCO
2006
67views more  JCO 2006»
13 years 4 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
VLDB
2007
ACM
150views Database» more  VLDB 2007»
13 years 10 months ago
Large Scale P2P Distribution of Open-Source Software
Open-source software communities currently face an increasing complexity in managing and distributing software content among their developers and contributors. This is mainly due ...
Serge Abiteboul, Itay Dar, Radu Pop, Gabriel Vasil...
CCGRID
2002
IEEE
13 years 9 months ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos
ISW
2009
Springer
13 years 11 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...
CAISE
2003
Springer
13 years 9 months ago
Hybrid Publish-Subscribe: A Compromise Approach for Large-Scale
Abstract. The purpose of this article is to propose a scalable, topologically and traffic-wise self-adapting approach to a publish/subscribe paradigm for supporting event-based app...
Roman Szarowski