Sciweavers

702 search results - page 76 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
HPDC
2002
IEEE
15 years 2 months ago
A Decentralized, Adaptive Replica Location Mechanism
We describe a decentralized, adaptive mechanism for replica location in wide-area distributed systems. Unlike traditional, hierarchical (e.g, DNS) and more recent (e.g., CAN, Chor...
Matei Ripeanu, Ian T. Foster
ICDE
2006
IEEE
114views Database» more  ICDE 2006»
15 years 3 months ago
HiWaRPP - Hierarchical Wavelet-based Retrieval on Peer-to-Peer Network
This paper introduces the use of wavelets for information retrieval in a peer-to-peer environment. In order to achieve our purposes, we use a new combination between broadcasting ...
Mihai Lupu, Bei Yu
GLOBECOM
2006
IEEE
15 years 3 months ago
Improving Voice and Data Service Provisioning in Cellular/WLAN Integrated Networks by Admission Control
— In this paper, we study the voice and data service provisioning in an integrated system of cellular and wireless local area networks (WLANs). To maximize the overall resource u...
Wei Song, Yu Cheng, Weihua Zhuang, Aladdin Saleh
SASO
2007
IEEE
15 years 4 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
ACSAC
2000
IEEE
15 years 2 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik