Sciweavers

702 search results - page 90 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
GLOBECOM
2009
IEEE
14 years 7 months ago
Time-Critical Data Dissemination in Cooperative Peer-to-Peer Systems
How to rapidly disseminate a large-sized file to many recipients is a fundamental problem in many applications, such as updating software patches and distributing large scientific ...
Chi-Jen Wu, Cheng-Ying Li, Kai-Hsiang Yang, Jan-Mi...
ICDE
2008
IEEE
108views Database» more  ICDE 2008»
15 years 11 months ago
Self-Join Size Estimation in Large-scale Distributed Data Systems
In this work we tackle the open problem of self-join size (SJS) estimation in a large-scale Distributed Data System, where tuples of a relation are distributed over data nodes whic...
Theoni Pitoura, Peter Triantafillou
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
TPDS
2008
262views more  TPDS 2008»
14 years 9 months ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino
DCOSS
2006
Springer
15 years 1 months ago
GIST: Group-Independent Spanning Tree for Data Aggregation in Dense Sensor Networks
Abstract. Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions o...
Lujun Jia, Guevara Noubir, Rajmohan Rajaraman, Rav...