Sciweavers

12301 search results - page 2399 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
CSREASAM
2008
15 years 1 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
15 years 1 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei
GECON
2008
Springer
152views Business» more  GECON 2008»
15 years 28 days ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
SIGCOMM
2010
ACM
15 years 1 days ago
Twittering by cuckoo: decentralized and socio-aware online microblogging services
Online microblogging services, as exemplified by Twitter, have become immensely popular during the latest years. However, current microblogging systems severely suffer from perfor...
Tianyin Xu, Yang Chen, Xiaoming Fu, Pan Hui
COMCOM
2008
91views more  COMCOM 2008»
14 years 12 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
« Prev « First page 2399 / 2461 Last » Next »