Sciweavers

4305 search results - page 567 / 861
» Analysing Protocol Implementations
Sort
View
DISCEX
2003
IEEE
15 years 10 months ago
Improving Failure Responsiveness in Jini Leasing
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Scott Rose, Kevin Bowers, Stephen Quirolgico, Kevi...
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
15 years 10 months ago
Java Mobile Agents on Project JXTA Peer-to-Peer Platform
Over the last year Peer-to-Peer (p2p) implementations have evolved from experimental to sophisticated systems. Mobile agents have a long e-Commerce history dating back to the midd...
Rita Yu Chen, Bill Yeager
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
15 years 10 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...
DEBS
2003
ACM
15 years 10 months ago
Relational subscription middleware for Internet-scale publish-subscribe
We present a design of a distributed publish-subscribe system that extends the functionality of messaging middleware with “relational subscriptions”, to support timely updates...
Yuhui Jin, Robert E. Strom
120
Voted
FPL
2003
Springer
100views Hardware» more  FPL 2003»
15 years 10 months ago
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall use...
John W. Lockwood, Christopher E. Neely, Christophe...