Sciweavers

702 search results - page 66 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
CN
2006
79views more  CN 2006»
14 years 10 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 10 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
ESAW
2009
Springer
15 years 4 months ago
Peer-to-Peer Overlay Network Based on Swarm Intelligence
As the number of information in the Internet constantly increases and the complexity of systems rapidly grows, locating and manipulating complex data has become a difficult task. W...
Vesna Sesum-Cavic, eva Kühn
WETICE
2006
IEEE
15 years 3 months ago
Architecture of a Network Monitoring Element
A Network Monitoring system is a vital component of a Grid; however, its scalability is a challenge. We propose a network monitoring approach that combines passive monitoring, a do...
Augusto Ciuffoletti, Michalis Polychronakis
TPDS
2010
142views more  TPDS 2010»
14 years 8 months ago
Toward Optimal Network Fault Correction in Externally Managed Overlay Networks
—We consider an end-to-end approach of inferring probabilistic data-forwarding failures in an externally managed overlay network, where overlay nodes are independently operated b...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein