Sciweavers

5866 search results - page 947 / 1174
» Designing Accelerator-Based Distributed Systems for High Per...
Sort
View
109
Voted
CCS
2009
ACM
15 years 10 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
SSS
2009
Springer
103views Control Systems» more  SSS 2009»
15 years 10 months ago
Network-Friendly Gossiping
The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on ...
Sabina Serbu, Etienne Riviere, Pascal Felber
134
Voted
ATAL
2007
Springer
15 years 10 months ago
SSDPOP: improving the privacy of DCOP with secret sharing
Multi-agent systems designed to work collaboratively with groups of people typically require private information that people will entrust to them only if they have assurance that ...
Rachel Greenstadt, Barbara J. Grosz, Michael D. Sm...
134
Voted
GECCO
2007
Springer
276views Optimization» more  GECCO 2007»
15 years 10 months ago
Meta-optimizing semantic evolutionary search
I present MOSES (meta-optimizing semantic evolutionary search), a new probabilistic modeling (estimation of distribution) approach to program evolution. Distributions are not esti...
Moshe Looks
NDSS
2005
IEEE
15 years 9 months ago
MOVE: An End-to-End Solution to Network Denial of Service
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh,...