Sciweavers

7683 search results - page 1330 / 1537
» Distributed Computing with the CLAN Network
Sort
View
AINA
2004
IEEE
15 years 8 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
135
Voted
DSN
2006
IEEE
15 years 8 months ago
Lucky Read/Write Access to Robust Atomic Storage
This paper establishes tight bounds on the best-case time-complexity of distributed atomic read/write storage implementations that tolerate worst-case conditions. We study asynchr...
Rachid Guerraoui, Ron R. Levy, Marko Vukolic
AINA
2010
IEEE
15 years 8 months ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
AAAI
2007
15 years 6 months ago
A Connectionist Cognitive Model for Temporal Synchronisation and Learning
The importance of the efforts towards integrating the symbolic and connectionist paradigms of artificial intelligence has been widely recognised. Integration may lead to more e...
Luís C. Lamb, Rafael V. Borges, Artur S. d'...
CCS
2008
ACM
15 years 6 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
« Prev « First page 1330 / 1537 Last » Next »