Sciweavers

2503 search results - page 285 / 501
» Building Computer Network Attacks
Sort
View
CLUSTER
2008
IEEE
15 years 8 months ago
Predictive models for bandwidth sharing in high performance clusters
Abstract—Using MPI as communication interface, one or several applications may introduce complex communication behaviors over the network cluster. This effect is increased when n...
Jérôme Vienne, Maxime Martinasso, Jea...
97
Voted
NCA
2006
IEEE
15 years 8 months ago
A System for Secure IP Telephone Conferences
We present a system for secure telephone conferences (stc) over the internet. The system ensures participant authentication via x.509 certificates, such that every participant of...
Axel Treßel, Jorg Keller
LCR
2000
Springer
118views System Software» more  LCR 2000»
15 years 5 months ago
Run-Time Support for Adaptive Heavyweight Services
By definition, a heavyweight network service requires a significant amount of computation to complete its task. Providing a heavyweight service is challenging for a number of reaso...
Julio C. López, David R. O'Hallaron
NOSSDAV
1995
Springer
15 years 5 months ago
A Distributed Real-Time MPEG Video Audio Player
Abstract. This paper presents the design, implementation and experimental analysis of a distributed, real-time MPEG video and audio player. The player is designed for use across th...
Shanwei Cen, Calton Pu, Richard Staehli, Crispin C...
P2P
2009
IEEE
15 years 8 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...