Sciweavers

1647 search results - page 42 / 330
» Distributing private data in challenged network environments
Sort
View
CN
2002
87views more  CN 2002»
15 years 5 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
RTAS
2009
IEEE
16 years 3 days ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
HPDC
1999
IEEE
15 years 9 months ago
A Resource Description Environment for Distributed Computing Systems
RSD (Resource and Service Description) is a software architecture for specifying, registering and accessing resources and services in complex heterogeneous computing environments....
Matthias Brune, Alexander Reinefeld, Jörg Var...
TKDE
2010
272views more  TKDE 2010»
15 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
PADS
2005
ACM
15 years 11 months ago
An Adaptive Interest Management Scheme for Distributed Virtual Environments
Abstract— Traditionally Interest Management (IM) in distributed environments has been performed through a ‘top-down’ expression of interest patterns in the model. For many mo...
Rob Minson, Georgios K. Theodoropoulos