Sciweavers

832 search results - page 125 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
JPDC
2007
112views more  JPDC 2007»
14 years 11 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
DSOM
2004
Springer
15 years 4 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
DIAU
2000
Springer
15 years 3 months ago
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, a peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers...
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodor...
NSDI
2007
15 years 1 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
SAC
2000
ACM
15 years 3 months ago
A Mobile Agent Infrastructure for the Mobility Support
The mobility of terminals and users is a crucial issue in the open global system represented by the Internet. Supporting terminal and user mobility requires a middleware infrastru...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...