Sciweavers

2503 search results - page 333 / 501
» Building Computer Network Attacks
Sort
View
AIMS
2008
Springer
15 years 8 months ago
A Theory of Closure Operators
We explore how fixed-point operators can be designed to interact and be composed to form autonomic control mechanisms. We depart from the idea that an operator is idempotent only ...
Alva L. Couch, Marc Chiarini
DSN
2005
IEEE
15 years 7 months ago
Fast Byzantine Consensus
— We present the first protocol that reaches asynchronous Byzantine consensus in two communication steps in the common case. We prove that our protocol is optimal in terms of bo...
Jean-Philippe Martin, Lorenzo Alvisi
ICDCSW
2002
IEEE
15 years 6 months ago
Hermes: A Distributed Event-Based Middleware Architecture
In this paper, we argue that there is a need for an event-based middleware to build large-scale distributed systems. Existing publish/subscribe systems still have limitations comp...
Peter R. Pietzuch, Jean Bacon
CONEXT
2007
ACM
15 years 5 months ago
ER: efficient retransmission scheme for wireless LANs
Wireless LANs (WLANs) have been deployed at a remarkable rate at university campuses, office buildings, airports, hotels, and malls. Providing efficient and reliable wireless comm...
Eric Rozner, Anand Padmanabha Iyer, Yogita Mehta, ...
TRIDENTCOM
2010
IEEE
14 years 11 months ago
Experimental Evaluation of OpenVZ from a Testbed Deployment Perspective
A scalable approach to building large scale experimentation testbeds involves multiplexing the system resources for better utilization. Virtualization provides a convenient means o...
Gautam D. Bhanage, Ivan Seskar, Yanyong Zhang, Dip...