Sciweavers

1630 search results - page 135 / 326
» Secure Overlay Network Design
Sort
View
PAKDD
2007
ACM
203views Data Mining» more  PAKDD 2007»
15 years 4 months ago
Grammar Guided Genetic Programming for Flexible Neural Trees Optimization
Abstract. In our previous studies, Genetic Programming (GP), Probabilistic Incremental Program Evolution (PIPE) and Ant Programming (AP) have been used to optimal design of Flexibl...
Peng Wu, Yuehui Chen
AICT
2006
IEEE
122views Communications» more  AICT 2006»
15 years 4 months ago
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
A peer-to-peer file sharing system includes a lookup and a content distribution protocol. Very efficient peer-to-peer protocols exist for content distribution, but efficient in...
Anh-Tuan Gai, Laurent Viennot
ACSAC
2002
IEEE
15 years 3 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
INFOCOM
2007
IEEE
15 years 4 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...
CCR
2007
115views more  CCR 2007»
14 years 10 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin