Sciweavers

1153 search results - page 169 / 231
» Component Search Service and Deployment of Distributed Appli...
Sort
View
DISCEX
2003
IEEE
15 years 5 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
90
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
Inference and Labeling of Metric-Induced Network Topologies
—The development and deployment of distributed network-aware applications and services require the ability to compile and maintain a model of the underlying network resources wit...
Azer Bestavros, John W. Byers, Khaled Harfoush
119
Voted
TC
1998
15 years 6 days ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
FTDCS
2003
IEEE
15 years 5 months ago
On-Demand Media Streaming Over the Internet
We propose a new model for on-demand media streaming centered around the peer-to-peer (P2P) paradigm. The proposed P2P model can support a large number of clients with a low overa...
Mohamed Hefeeda, Bharat K. Bhargava
123
Voted
ICPADS
2008
IEEE
15 years 7 months ago
SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems
In order to ease the development and maintenance of more complex P2P applications, which combine multiple P2P functionality (e.g. streaming and dependable storage), we suggest to ...
Kalman Graffi, Aleksandra Kovacevic, Song Xiao, Ra...