Sciweavers

3300 search results - page 457 / 660
» Performance Trade-Off in Distributed Simulation
Sort
View
71
Voted
WWW
2002
ACM
15 years 11 months ago
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service at...
Jaeyeon Jung, Balachander Krishnamurthy, Michael R...
CCS
2009
ACM
15 years 6 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
ICNP
2009
IEEE
15 years 5 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
ATAL
2009
Springer
15 years 5 months ago
Decentralised dynamic task allocation: a practical game: theoretic approach
This paper reports on a novel decentralised technique for planning agent schedules in dynamic task allocation problems. Specifically, we use a Markov game formulation of these pr...
Archie C. Chapman, Rosa Anna Micillo, Ramachandra ...
73
Voted
INFOCOM
2008
IEEE
15 years 5 months ago
Searching for Rare Objects Using Index Replication
—Searching for objects is a fundamental problem for popular peer-to-peer file-sharing networks that contribute to much of the traffic on today’s Internet. While existing prot...
Krishna Puttaswamy, Alessandra Sala, Ben Y. Zhao