Sciweavers

3031 search results - page 261 / 607
» SNMS - Shadow Network Management System
Sort
View
GCC
2004
Springer
15 years 10 months ago
Maintaining Comprehensive Resource Availability in P2P Networks
Abstract. In this paper, the resource availability issue has been addressed with respect to the intermittent connectivity and dynamic presence of peers in a P2P system. We aim to m...
Bin Xiao, Jiannong Cao, Edwin Hsing-Mean Sha
MOBISYS
2007
ACM
16 years 4 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ICDCSW
2007
IEEE
15 years 11 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
DEXAW
1999
IEEE
114views Database» more  DEXAW 1999»
15 years 9 months ago
A Web-Based Distributed Environment to Support Teleteaching: Design and Implementation Issues
Web based systems have been shown to be useful tools for supporting educational communication for teachers and students. In this paper we present such a system, which is an Integr...
Christos Bouras, Apostolos Gkamas, Thrasyvoulos Ts...
WS
2004
ACM
15 years 10 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala