Sciweavers

2503 search results - page 414 / 501
» Building Computer Network Attacks
Sort
View
MASCOTS
1993
15 years 2 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long
NAACL
1994
15 years 2 months ago
Recent Developments in the Experimental "WAXHOLM" Dialog System
Recently we have begun to build the basic tools for a generic speech-dialog system. The main modules, their function and internal communication have been specified. The different ...
Rolf Carlson
RAS
2008
109views more  RAS 2008»
15 years 29 days ago
When hard realtime matters: Software for complex mechatronic systems
A still growing number of software concepts and framworks have been proposed to meet the challenges in the development of more and more complex robotic systems, like humanoids or n...
Berthold Bäuml, Gerd Hirzinger
INFOCOM
2012
IEEE
13 years 3 months ago
An effective hop-by-hop Interest shaping mechanism for CCN communications
Abstract—We introduce a rate-based congestion control mechanism for Content-Centric Networking (CCN). It builds on the fact that one Interest retrieves at most one Data packet. C...
Natalya Rozhnova, Serge Fdida
160
Voted
ACMSE
2008
ACM
15 years 3 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins