Sciweavers

1153 search results - page 169 / 231
» Component Search Service and Deployment of Distributed Appli...
Sort
View
127
Voted
DISCEX
2003
IEEE
15 years 9 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
120
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Inference and Labeling of Metric-Induced Network Topologies
—The development and deployment of distributed network-aware applications and services require the ability to compile and maintain a model of the underlying network resources wit...
Azer Bestavros, John W. Byers, Khaled Harfoush
142
Voted
TC
1998
15 years 3 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
131
Voted
FTDCS
2003
IEEE
15 years 9 months ago
On-Demand Media Streaming Over the Internet
We propose a new model for on-demand media streaming centered around the peer-to-peer (P2P) paradigm. The proposed P2P model can support a large number of clients with a low overa...
Mohamed Hefeeda, Bharat K. Bhargava
155
Voted
ICPADS
2008
IEEE
15 years 10 months ago
SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems
In order to ease the development and maintenance of more complex P2P applications, which combine multiple P2P functionality (e.g. streaming and dependable storage), we suggest to ...
Kalman Graffi, Aleksandra Kovacevic, Song Xiao, Ra...