Sciweavers

1807 search results - page 160 / 362
» Resilient Overlay Networks
Sort
View
NSDI
2007
15 years 6 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
IIWAS
2008
15 years 6 months ago
On-the-fly collaboration in distributed systems through service semantic overlay
In the recent years distributed architectures and P2P technology have been adopted to better support effective collaboration among networked organizations. According to the P2P pa...
Devis Bianchini, Valeria De Antonellis, Michele Me...
WSCG
2000
97views more  WSCG 2000»
15 years 5 months ago
Human Movement Instruction System that Utilizes Avatar Overlays Using Stereoscopic Images
In the Mixed Reality environment that combines the real world and the virtual world it is important to control the 'place' that comprises both real and virtual objects. ...
Masayuki Ihara, Yoshihiro Shimada, Kenichi Kida, S...
NCA
2008
IEEE
15 years 11 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
DELOS
2004
15 years 5 months ago
Peer-to-Peer Overlays and Data Integration in a Life Science Grid
Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the act...
Curt Cramer, Andrea Schafferhans, Thomas Fuhrmann