Sciweavers

648 search results - page 73 / 130
» Authenticated hash tables
Sort
View
SIGCOMM
2004
ACM
15 years 5 months ago
A layered naming architecture for the internet
Currently the Internet has only one level of name resolution, DNS, which converts user-level domain names into IP addresses. In this paper we borrow liberally from the literature ...
Hari Balakrishnan, Karthik Lakshminarayanan, Sylvi...
SIGCOMM
2004
ACM
15 years 5 months ago
A scalable distributed information management system
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...
Praveen Yalagandula, Michael Dahlin
AIMS
2009
Springer
15 years 4 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
IMC
2007
ACM
15 years 1 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
PAMI
2002
187views more  PAMI 2002»
14 years 11 months ago
Human Activity Recognition Using Multidimensional Indexing
In this paper, we develop a novel method for view-based recognition of human action/activity from videos. By observing just a few frames, we can identify the activity that takes pl...
Jezekiel Ben-Arie, Zhiqian Wang, Purvin Pandit, Sh...