Sciweavers

351 search results - page 19 / 71
» Building Secure and Reliable Network Applications
Sort
View
PERCOM
2010
ACM
14 years 10 months ago
Practical experiences in enabling and ensuring quality sensing in emergency response applications
Situational awareness in emergency response is critical. Knowing the status of the hazards, the rescue workers, and the building occupants, etc., can greatly help the incident comm...
C. Davison, Daniel Massaguer, Lilia Paradis, M. Re...
COMCOM
2006
120views more  COMCOM 2006»
14 years 11 months ago
Explicit routing in multicast overlay networks
Application Level Multicast is a promising approach to overcome the deployment problems of IP level multicast by establishing delivery trees using overlay links among end systems....
Torsten Braun, Vijay Arya, Thierry Turletti
WWW
2008
ACM
16 years 14 days ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
USS
2008
15 years 2 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
ADHOC
2006
155views more  ADHOC 2006»
14 years 12 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...