Sciweavers

501 search results - page 34 / 101
» Redundancy and Diversity in Security
Sort
View
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 5 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
15 years 4 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
CIKM
2000
Springer
15 years 4 months ago
Creating and Evaluating Multi-Document Sentence Extract Summaries
This paper discusses passage extraction approaches to multidocument summarization that use available information about the document set as a whole and the relationships between th...
Jade Goldstein, Vibhu O. Mittal, Jaime G. Carbonel...
INFOCOM
2010
IEEE
14 years 10 months ago
Incorporating Random Linear Network Coding for Peer-to-Peer Network Diagnosis
—Recent studies show that network coding improves multicast session throughput. In this paper, we demonstrate how random linear network coding can be incorporated to provide netw...
Elias Kehdi, Baochun Li
ICDCS
2006
IEEE
15 years 5 months ago
Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery Guarantees
Content-based publish/subscribe (pub/sub) is a promising paradigm for building asynchronous distributed applications. In many application scenarios, these systems are required to ...
Yuanyuan Zhao, Daniel C. Sturman