Sciweavers

801 search results - page 125 / 161
» Active Messages: A Mechanism for Integrated Communication an...
Sort
View
ICAC
2007
IEEE
15 years 8 months ago
Energy-Aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems
With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on c...
Balasubramanian Seshasayee, Ripal Nathuji, Karsten...
CCGRID
2002
IEEE
15 years 7 months ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos
140
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 2 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
DSN
2009
IEEE
15 years 8 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
IFIP
2005
Springer
15 years 7 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray