Sciweavers

7329 search results - page 1233 / 1466
» Network Extractor Protocols
Sort
View
SAC
2008
ACM
15 years 3 months ago
Improving denial of service resistance using dynamic local adaptations
We improve the resistance of gossip-based multicast to (Distributed) Denial of Service (DoS) attacks using dynamic local adaptations at each node. Each node estimates the current ...
Gal Badishi, Idit Keidar
INFOCOM
2010
IEEE
15 years 2 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
ITNG
2010
IEEE
15 years 2 months ago
Towards Adaptive Replication Reconfiguration for QoS
— Replication is a technique widely used for large networked software systems to provide qualities such as reliability, availability, performance and scalability to their clients...
Raihan Al-Ekram, Richard C. Holt
P2P
2010
IEEE
150views Communications» more  P2P 2010»
15 years 2 months ago
Spotify -- Large Scale, Low Latency, P2P Music-on-Demand Streaming
Abstract—Spotify is a music streaming service offering lowlatency access to a library of over 8 million music tracks. Streaming is performed by a combination of client-server acc...
Gunnar Kreitz, Fredrik Niemelä
PSD
2010
Springer
154views Database» more  PSD 2010»
15 years 2 months ago
Coprivacy: Towards a Theory of Sustainable Privacy
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her...
Josep Domingo-Ferrer
« Prev « First page 1233 / 1466 Last » Next »