Sciweavers

7329 search results - page 1306 / 1466
» Network Extractor Protocols
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
IPPS
2007
IEEE
15 years 10 months ago
A Peer-to-Peer Infrastructure for Autonomous Grid Monitoring
Modern grids have become very complex by their size and their heterogeneity. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from ad...
Laurent Baduel, Satoshi Matsuoka
NCA
2007
IEEE
15 years 10 months ago
GORDA: An Open Architecture for Database Replication
Although database replication has been a standard feature in database management systems for a long time, third party solutions have been enjoying an increasing popularity. These ...
Alfrânio Correia Jr., José Pereira, L...
ROBOCOMM
2007
IEEE
15 years 10 months ago
Portable surgery master station for mobile robotic telesurgery
— We describe a system that provides a low-cost, portable control station for experimentation in mobile robotic telesurgery. The software and hardware implementation of our syste...
Ganesh Sankaranarayanan, Hawkeye H. I. King, Seong...
135
Voted
SASO
2007
IEEE
15 years 10 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
« Prev « First page 1306 / 1466 Last » Next »