Sciweavers

702 search results - page 110 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
IEEECIT
2006
IEEE
15 years 3 months ago
Multi-Agent based Data Integration in Real-world
This paper presents a Multi-Agent based Data Integration (MADI) framework for integrating distributed data source across Internet. This framework takes control on high-availabilit...
Yintang Dai, Shiyong Zhang
ICDCS
2006
IEEE
15 years 3 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
SIGCOMM
2012
ACM
13 years 5 days ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
CCECE
2006
IEEE
15 years 3 months ago
Security Issues in VOIP Applications
Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve se...
Patrick C. K. Hung, Miguel Vargas Martin
TELSYS
2010
140views more  TELSYS 2010»
14 years 4 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn