Sciweavers

480 search results - page 57 / 96
» Anonymous Transactions in Computer Networks
Sort
View
133
Voted
IPPS
1999
IEEE
15 years 8 months ago
Developing Parallel Applications Using the JAVAPORTS Environment
The JavaPorts system is an environment that facilitates the rapid development of modular, reusable, Java-based parallel and distributed applications for networked machines with het...
Demetris G. Galatopoullos, Elias S. Manolakos
P2P
2008
IEEE
15 years 10 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
PDP
2005
IEEE
15 years 9 months ago
FOBr: A Version-Based Recovery Protocol For Replicated Databases
Within the field of databases that are deployed in distributed environments there is a need to guarantee consistency among replicas and availability among nodes despite of networ...
Francisco Castro-Company, Luis Irún-Briz, F...
107
Voted
CCS
2010
ACM
15 years 4 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
132
Voted
FTDCS
2004
IEEE
15 years 7 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow