Sciweavers

2648 search results - page 200 / 530
» Challenges for Network Computer Games
Sort
View
96
Voted
NDSS
2006
IEEE
15 years 9 months ago
Deploying a New Hash Algorithm
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
Steven M. Bellovin, Eric Rescorla
114
Voted
KIVS
2005
Springer
15 years 9 months ago
Reconfigurable consumer direct logistics systems
Abstract: The goals of the interdisciplinary project HORN were as well to improve competitiveness of service providers that deliver grocery items as to develop new hardware and sof...
Sébastien Truchat, Alexander Pflaum
106
Voted
CONEXT
2007
ACM
15 years 7 months ago
A quicker way to discover nearby peers
The match between a peer-to-peer overlay and the physical Internet infrastructure is a constant issue. Time-constrained peer-to-peer applications such as live streaming systems ar...
Gwendal Simon, Yiping Chen, Ali Boudani
134
Voted
NSDI
2010
15 years 5 months ago
Carousel: Scalable Logging for Intrusion Prevention Systems
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and...
Vinh The Lam, Michael Mitzenmacher, George Varghes...
137
Voted
IFIP
2004
Springer
15 years 9 months ago
Ad Hoc Routing with Early Unidirectionality Detection and Avoidance
This paper is motivated by the observation that current research in ad hoc networks mostly assumes a physically flat network architecture with the nodes having homogeneous charact...
Young-Bae Ko, Sung-Ju Lee, Jun-Beom Lee