Sciweavers

119 search results - page 21 / 24
» A Flexible Resource Location Protocol for Peer-to-Peer Netwo...
Sort
View
ICDE
1999
IEEE
123views Database» more  ICDE 1999»
16 years 1 months ago
Scalable Web Server Design for Distributed Data Management
Traditional techniques for a distributed web server design rely on manipulation of central resources, such as routers or DNS services, to distribute requests designated for a sing...
Scott M. Baker, Bongki Moon
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
15 years 5 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
AINA
2004
IEEE
15 years 3 months ago
Mobile IPv6 Extensions to support Nested Mobile Networks
Unlike host mobility support, network mobility is concerned with situations where an entire network changes its point of attachment to the Internet. Furthermore, we should conside...
ZhiJun Gu, Dongmin Yang, Cheeha Kim
SENSYS
2005
ACM
15 years 5 months ago
MAX: human-centric search of the physical world
MAX is a system that facilitates human-centric search of the physical world. It allows humans to search for and locate objects as and when they need it instead of organizing them ...
Kok-Kiong Yap, Vikram Srinivasan, Mehul Motani
ESORICS
2000
Springer
15 years 3 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud