Sciweavers

2071 search results - page 277 / 415
» An Empirical Evaluation of LFG-DOP
Sort
View
105
Voted
P2P
2006
IEEE
135views Communications» more  P2P 2006»
15 years 6 months ago
Ordered Slicing of Very Large-Scale Overlay Networks
Recently there has been an increasing interest to harness the potential of P2P technology to design and build rich environments where services are provided and multiple applicatio...
Márk Jelasity, Anne-Marie Kermarrec
SRDS
2006
IEEE
15 years 6 months ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter
79
Voted
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
15 years 6 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
99
Voted
ACMDIS
2006
ACM
15 years 6 months ago
The impact of pre-patterns on the design of digital home applications
Recent research suggests design pre-patterns, structured collections of evidence-based research and design knowledge, provide a useful resource for design activities in emerging a...
T. Scott Saponas, Madhu K. Prabaker, Gregory D. Ab...
84
Voted
EXPDB
2006
ACM
15 years 6 months ago
Symmetric Publish / Subscribe via Constraint Publication
Current publish / subscribe systems offer a range of expressive subscription languages for constraints. However, classical systems restrict the publish operation to be a single p...
Anthony Tomasic, Charles Garrod, Kris Popendorf