Sciweavers

7329 search results - page 1239 / 1466
» Network Extractor Protocols
Sort
View
PDCAT
2009
Springer
15 years 11 months ago
Analytical Study of Adversarial Strategies in Cluster-based Overlays
Abstract—Awerbuch and Scheideler have shown that peerto-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topo...
Emmanuelle Anceaume, Francisco V. Brasileiro, Roma...
AINA
2007
IEEE
15 years 10 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 10 months ago
Performance Modeling of Multi-Rate HDR and its Effect on TCP Throughput
—An interesting feature of the 3G cellular networks is their ability to support multiple data rates. Though the performance of TCP over wireless networks has been well studied, t...
Wenjing Wang, Shamik Sengupta, Mainak Chatterjee
ICDCSW
2007
IEEE
15 years 10 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar
ICNP
2007
IEEE
15 years 10 months ago
Greedy Virtual Coordinates for Geographic Routing
— We present a new approach for generating virtual coordinates that produces usable coordinates quickly and improves the routing performance of existing geographic routing algori...
Ben Leong, Barbara Liskov, Robert Morris
« Prev « First page 1239 / 1466 Last » Next »