Sciweavers

1144 search results - page 185 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
EDO
2006
Springer
15 years 2 months ago
Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network
In this paper we present Damon, a decentralized wide-area runtime aspect middleware built on top of a structured peer-topeer (p2p) substrate and a dynamic Aspect Oriented Programm...
Rubén Mondéjar, Pedro García ...
ICN
2005
Springer
15 years 4 months ago
Load Distribution Performance of the Reliable Server Pooling Framework
Abstract. The Reliable Server Pooling (RSerPool) protocol suite currently under standardization by the IETF is designed to build systems providing highly available services by prov...
Thomas Dreibholz, Erwin P. Rathgeb, Michael Tü...
TON
2012
13 years 1 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
ESAS
2004
Springer
15 years 2 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
IPSN
2007
Springer
15 years 5 months ago
Robust message-passing for statistical inference in sensor networks
Large-scale sensor network applications require in-network processing and data fusion to compute statistically relevant summaries of the sensed measurements. This paper studies di...
Jeremy Schiff, Dominic Antonelli, Alexandros G. Di...