Sciweavers

1690 search results - page 294 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
102
Voted
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 7 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 6 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
MM
2004
ACM
136views Multimedia» more  MM 2004»
15 years 6 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
P2P
2003
IEEE
108views Communications» more  P2P 2003»
15 years 6 months ago
Multicast in DKS(N, k, f) Overlay Networks
Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures fo...
Luc Onana Alima, Ali Ghodsi, Sameh El-Ansary, Per ...
ICWS
2009
IEEE
14 years 10 months ago
From Workflow Models to Executable Web Service Interfaces
Workflow models have been used and refined for years to execute processes within organisations. To deal with collaborative processes (choreographies) these internal workflow model...
Armin Haller, Mateusz Marmolowski, Walid Gaaloul, ...