Sciweavers

20441 search results - page 3661 / 4089
» Locally Computable Structures
Sort
View
LCN
2007
IEEE
15 years 11 months ago
Towards Stateless Single-Packet IP Traceback
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 11 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
P2P
2007
IEEE
132views Communications» more  P2P 2007»
15 years 11 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
ROMAN
2007
IEEE
156views Robotics» more  ROMAN 2007»
15 years 11 months ago
Development and User Testing of the Gestural Joystick for Gloves-On Hazardous Environments
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...
SCCC
2007
IEEE
15 years 11 months ago
A Relaxed-Ring for Self-Organising and Fault-Tolerant Peer-to-Peer Networks
There is no doubt about the increase in popularity of decentralised systems over the classical client-server architecture in distributed applications. These systems are developed ...
Boris Mejías, Peter Van Roy
« Prev « First page 3661 / 4089 Last » Next »