Sciweavers

10950 search results - page 2031 / 2190
» Future wireless networks
Sort
View
119
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 7 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
119
Voted
SOCA
2007
IEEE
15 years 7 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
127
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
107
Voted
ER
2007
Springer
117views Database» more  ER 2007»
15 years 7 months ago
Conceptual Modeling for Virtual Reality
This paper explores the opportunities and challenges for Conceptual Modeling in the domain of Virtual Reality (VR). VR applications are becoming more feasible due to better and fa...
Olga De Troyer, Frederic Kleinermann, Bram Pellens...
EUROPAR
2007
Springer
15 years 7 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
« Prev « First page 2031 / 2190 Last » Next »