Sciweavers

2904 search results - page 442 / 581
» Internet Infrastructure Security
Sort
View
115
Voted
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 9 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
127
Voted
GC
2004
Springer
15 years 9 months ago
BGP-Based Clustering for Scalable and Reliable Gossip Broadcast
This paper presents a locality-based dissemination graph algorithm for scalable reliable broadcast. Our algorithm scales in terms of both network and memory usage. Processes only h...
M. Brahami, Patrick Th. Eugster, Rachid Guerraoui,...
130
Voted
SEMWEB
2004
Springer
15 years 9 months ago
On the Emergent Semantic Web and Overlooked Issues
The emergent Semantic Web, despite being in its infancy, has already received a lot of attention from academia and industry. This resulted in an abundance of prototype systems and ...
Yannis Kalfoglou, Harith Alani, W. Marco Schorlemm...
128
Voted
SEMWEB
2004
Springer
15 years 9 months ago
Small Can Be Beautiful in the Semantic Web
In 1984, Peter Patel-Schneider published a paper [1] entitled Small can be Beautiful in Knowledge Representation in which he advocated for limiting the expressive power of knowledg...
Marie-Christine Rousset
129
Voted
ICNP
2003
IEEE
15 years 9 months ago
Optimal Resource Allocation in Overlay Multicast
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
Yi Cui, Yuan Xue, Klara Nahrstedt