Sciweavers

290 search results - page 32 / 58
» A Scalable, Ordered Scenario-Based Network Security Simulato...
Sort
View
CCS
2004
ACM
15 years 5 months ago
Mitigating bandwidth-exhaustion attacks using congestion puzzles
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
XiaoFeng Wang, Michael K. Reiter
MATA
2001
Springer
177views Communications» more  MATA 2001»
15 years 4 months ago
A Self-adaptable Agent System for Efficient Information Gathering
As networks become all-pervasive the importance of efficient information gathering for purposes such as monitoring, fault diagnosis, and performance evaluation can only increase. E...
Antonio Liotta, George Pavlou, Graham Knight
LCN
2008
IEEE
15 years 6 months ago
Supporting geographical queries onto DHTs
Location-based services (LBS) are currently receiving world-wide attention as a consequence of the massive usage of mobile devices, but such location services require scalable dis...
Jordi Pujol Ahulló, Pedro García L&o...
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
SIGMOD
2006
ACM
111views Database» more  SIGMOD 2006»
15 years 12 months ago
On the database/network interface in large-scale publish/subscribe systems
The work performed by a publish/subscribe system can conceptually be divided into subscription processing and notification dissemination. Traditionally, research in the database a...
Badrish Chandramouli, Jun Yang 0001, Junyi Xie