Sciweavers

8493 search results - page 359 / 1699
» Implementing a distributed firewall
Sort
View
WETICE
2009
IEEE
15 years 11 months ago
A Gossip-Based Distributed Social Networking System
—Social networking web sites, which allow users to create identities and link them to friends who have also created identities, are highly popular. Systems such as Facebook and M...
S. M. A. Abbas, Johan A. Pouwelse, Dick H. J. Epem...
NDSS
2009
IEEE
15 years 11 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
AGS
2009
Springer
15 years 11 months ago
Distributed Platform for Large-Scale Agent-Based Simulations
Abstract. We describe a distributed architecture for situated largescale agent-based simulations with predominately local interactions. The approach, implemented in AglobeX Simulat...
David Sislák, Premysl Volf, Michal Jakob, M...
RV
2009
Springer
101views Hardware» more  RV 2009»
15 years 11 months ago
DMaC: Distributed Monitoring and Checking
Abstract. We consider monitoring and checking formally specified properties in a network. We are addressing the problem of deploying the checkers on different network nodes that ...
Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup ...
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 11 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov